General
-
Target
31c5d5c6c1472be76d835c902762f053
-
Size
99KB
-
Sample
231225-wabc8sfeep
-
MD5
31c5d5c6c1472be76d835c902762f053
-
SHA1
6eac48c45c73c7d4a541e0c802cfb1b93de97417
-
SHA256
4c6d154b22d10fa7cf9f45d7c3561f668084b23c8cbe44cbf21dae91dfe9dd1a
-
SHA512
48617aa0b21012e11ab4a785dbe3352790d7268a6cb4542d2800aee0018b4f23215d41be0de8ddf7aa01b1cad3ac4b8505fb1685d2bd02ad4ce126b2e3af9c20
-
SSDEEP
3072:W47excGxFLPkH9SnbZDazo21mLtQqVI+8iX0:W+eGYtPk0Z+zo6JDiX0
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-BABE.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
GOLAYA-BABE.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
GOLAYA-BABE.exe
-
Size
149KB
-
MD5
e1fb70408c7945c6524c321063bd9570
-
SHA1
ebcd6a63fac9609c46e9c84708aa1e5701ee7775
-
SHA256
3e2da7a655e400f9e6ad442d4db21bac0a9528bc825aaaa8fdd97406458a59ed
-
SHA512
58751bd094dfc28c8b83085a480f70d1dfc97b990e69d90c4abe6ad5ec68c2a215445a664d5287bc624eab4175c2479fe6f0802b045fea61c12449af05f34814
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0higWrUzM/XP:AbXE9OiTGfhEClq9GWruyXP
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-