General
-
Target
c6ffd266927f1cc3478b7868c37a530cf17f0f2778c6dbacde0ea239126a6a33
-
Size
124KB
-
Sample
221206-c2lhqscb2z
-
MD5
bcb402a40b64cf5836b9ff551683288a
-
SHA1
e5650905f752640e7ae2bc1ac9cbc48f6ebb25f7
-
SHA256
c6ffd266927f1cc3478b7868c37a530cf17f0f2778c6dbacde0ea239126a6a33
-
SHA512
bbcd344174232d466ae021c4cdd7907701790b34e98a9e3fc53e5ff32f2545c3f33b57f02611b53ea35ecb8bef84e2c98f0e07e7095bec0bef67166a2922fe86
-
SSDEEP
3072:SnHXMpxcGxFyhQ0bOqYJrC06GdkEfj+BcB9AHDMVTCjtR:WHmGY/o0JrV6GJ+q98DMxsR
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-DEVOCHKA.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
GOLAYA-DEVOCHKA.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
GOLAYA-DEVOCHKA.exe
-
Size
239KB
-
MD5
6839c4c1e533bdef312fa9501b7cd622
-
SHA1
0a4a288e686a64c0d926e5d5c7ddd46ec7eeeaa1
-
SHA256
5b40e9c2a5bbd190d09eade750b1ce1a48887f6822a3e8a4cf3f927c38088982
-
SHA512
d0cafe97a7ab0444424d88d6fddbe2bb0bc9d33abaaeec21101388982d40728d5114d30d1d9b3f7b5d0ea77cbfc6f8067256d4cd7613d14de74ccd196a1dd954
-
SSDEEP
3072:MBAp5XhKpN4eOyVTGfhEClj8jTk+0hYoO/MgjqEWBz+Cgw5CKHy:7bXE9OiTGfhEClq95/MgXJJUy
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-