General
-
Target
5842d210181d80d30e552f6ef1c83335ff842494d5ecdf6db033a422fd0c17c2
-
Size
119KB
-
Sample
221206-aa1r8sab76
-
MD5
0bde836e61453f32d36ebc114251a271
-
SHA1
057b55c3f009857c8ad5bebd1f0fb0e806bbac6f
-
SHA256
5842d210181d80d30e552f6ef1c83335ff842494d5ecdf6db033a422fd0c17c2
-
SHA512
e8b7632114d623e05893a58c4ba8cc75713cc1289c94f8f23fadd3460a1eaf3cde608632040f3e3bbc80892567a39cab8577e21f56c70c769a877773a33c3c47
-
SSDEEP
1536:Ln/bwDHHUQTsX36h0ST44dpapQBCUo95MoqwWWku+8w5eJx8twlaGmMd/7Gp:LnmH0QTs66Kz2gCU8uoLceHXBs
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-DEVOCHKA.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
GOLAYA-DEVOCHKA.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
GOLAYA-DEVOCHKA.exe
-
Size
237KB
-
MD5
5c94059adb47691be3bd70b628224d42
-
SHA1
2173a63636142956ac0f2032caf3c327f27dd4cc
-
SHA256
5159ded8a0a546ebbed689e870873c7cea047be40d6311cc475d3ca5cedfcd52
-
SHA512
dd9178ee54765bf7c002889ff700516b77c5297e446f284a2f36768325cd5dd531878d1c07fe013024e92c001f9450fb349b26b0608426dda12a7d9f62f74701
-
SSDEEP
3072:6BAp5XhKpN4eOyVTGfhEClj8jTk+0h5Y2AGeS/+Cgw5CKHS:JbXE9OiTGfhEClq9AY2AGe/JJUS
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-