General
-
Target
45d038f4653d1f378dde8e525df60656
-
Size
90KB
-
Sample
231226-alm1hsebf5
-
MD5
45d038f4653d1f378dde8e525df60656
-
SHA1
ab5b17716e5743564d69a56941e5b2b21dde1dc8
-
SHA256
9b1fc9852a37e60c5912b048f99fd8557ca8c1c94cd7b8c78f36c4c36fb6a830
-
SHA512
c9ff5d6af55a48e6946b5887963d3811bc381dd45402516064e65a0ffd689d00eb3dc0afd251dbd818b3efed42f22cfa40255c5dfe0cd0c9343de0b52717b5cf
-
SSDEEP
1536:akDro9Ash6VQZtlRtQlQ7pYw/zQymCJVVBZHITMOHysSTj1B9Ip9fWRYVBXAgOnW:BDvsEU8lGpD/NZBZHlGysSTBB9Ip9cYP
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-DEVOCHKA.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
GOLAYA-DEVOCHKA.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
GOLAYA-DEVOCHKA.exe
-
Size
180KB
-
MD5
4f0501d3741234b99f31ed8b7caad73c
-
SHA1
b64354ecd96279f8eb9b9fbdeb9696cbae1458bb
-
SHA256
f715c0b6d8971f65335ba0c4499e82c7f56df615209c7b5b30d79bb79f2c9b6d
-
SHA512
373397915c7e9251b1a24359722efbf13f2c6b5081f8208fe8572c7bf94fa2c0bb4ac1064ff3dbc1fd0d84ac82820ecc20341cb1393b5c35df8a61f8b1623a4d
-
SSDEEP
3072:bBAp5XhKpN4eOyVTGfhEClj8jTk+0hq4zRQhF4:GbXE9OiTGfhEClq9boWk
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-