General
-
Target
506a06f9c5340e1299fb420b66c6e7ecacdd2d464c896a90f18b62dd57e4ce1f
-
Size
100KB
-
Sample
221020-trvr4adbf6
-
MD5
4262fc47a9ce09357618f8a40dda5d50
-
SHA1
b21ff8a3bd1bd8800d126a72ce656587e8d33269
-
SHA256
506a06f9c5340e1299fb420b66c6e7ecacdd2d464c896a90f18b62dd57e4ce1f
-
SHA512
b597d0a8ad5212000769f4ee9eb7bddd624b490e9ed15a3ab4a1815aa7be699064144b97a63b6fec8687e6b54eb4ea6675e2707935a8625051e7632d1a52cb6a
-
SSDEEP
3072:j47excGxFLPkH9SnbZDa7Ru8ltieVbZWxgIft:j+eGYtPk0Z+7RogIF
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-BABE.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
GOLAYA-BABE.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
GOLAYA-BABE.exe
-
Size
150KB
-
MD5
9fcb47ec7908b46b029001a8f34a7b71
-
SHA1
a7c56e81bbea0611d6207aceb9f9a9278cdbb1fa
-
SHA256
11230d56b431972ce4366660080af1cefc2443073ad089797ffa1d6e0ce6be80
-
SHA512
88e93b71e286808593b45cfe937d63cdff6b34cdd89d24bc6e09e0ac8428f4645d627db79e4f8d134b44450e6cae9a38ee5db5f239519692fb637e2a416d4b38
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hirzE2/gIfr:AbXE9OiTGfhEClq9dbgIz
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-