General
-
Target
d9f516a62c9dc449430a06f2986046a926761baa47920469598ae5411d1e17f3
-
Size
88KB
-
Sample
221206-ajgeysdf51
-
MD5
02190951f43e97b80a6416ed1eb16e48
-
SHA1
01b4dc5b4fab886f5445eb9114b8be494c277a6f
-
SHA256
d9f516a62c9dc449430a06f2986046a926761baa47920469598ae5411d1e17f3
-
SHA512
273af3fcaa67c0466b44a4173937fece64b5e07eeee2c38b7467fae28bdff22efbe1e240918db702ec641117ab0383098401b86ba1a3cc078db7d3c64414cdc2
-
SSDEEP
1536:zQwHfvMS0xcGxFyhQkrnb1Mq9WbB7fS+lE+dFNpRD+xIh7N0YNPrEiJolmF:znHXMpxcGxFyhQ0bOqYxf7v3YKj3JoUF
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-DEVOCHKA.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
GOLAYA-DEVOCHKA.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
GOLAYA-DEVOCHKA.exe
-
Size
180KB
-
MD5
f28c1e58c5766a111297588e8ab02361
-
SHA1
3d55a55fd6d193d32742fe89bf6041f9182ee447
-
SHA256
6e239da433517b0856f91d212baebdf1963d80ba6c546a440da19121580818ca
-
SHA512
e09add020c39a8fa5b14f094679daa9d0645f4c0fe39a33194e9c4c3cdadee05986904084387437203387d97be4381c9714e47451aff01e6a7e6fcb5ec9797fd
-
SSDEEP
3072:6BAp5XhKpN4eOyVTGfhEClj8jTk+0hL/eSZZvLf6CNsPrXJ8WYQKaLba:JbXE9OiTGfhEClq90GSZZvLCCNsPrXJa
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-