General
-
Target
4bd657121927792278495e2b7cbe83c3
-
Size
90KB
-
Sample
231226-cm42jagha5
-
MD5
4bd657121927792278495e2b7cbe83c3
-
SHA1
fe6b1b3b48f8d92bb700308c9490b6e04f41469a
-
SHA256
4a1a3d0f11b09b29e3640144188ee45937a6ddde64b4c495d5264f67b6b0f429
-
SHA512
b435280d2a66b5f1ba63d9dc1ef049450afcac3cf9245a607ea1a2946c67c8c8be73b9c5b43552340a5cbabb69c32d0b638a021bb223e1efbb3bd82525769824
-
SSDEEP
1536:VkDro9Ash6VQZtlRtQlQ7pYw/zQymCJVVBZHITMOHysSTj1B9Ip9fWRYVBXAgOnp:GDvsEU8lGpD/NZBZHlGysSTBB9Ip9cYk
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-DEVOCHKA.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
GOLAYA-DEVOCHKA.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
GOLAYA-DEVOCHKA.exe
-
Size
180KB
-
MD5
4f0501d3741234b99f31ed8b7caad73c
-
SHA1
b64354ecd96279f8eb9b9fbdeb9696cbae1458bb
-
SHA256
f715c0b6d8971f65335ba0c4499e82c7f56df615209c7b5b30d79bb79f2c9b6d
-
SHA512
373397915c7e9251b1a24359722efbf13f2c6b5081f8208fe8572c7bf94fa2c0bb4ac1064ff3dbc1fd0d84ac82820ecc20341cb1393b5c35df8a61f8b1623a4d
-
SSDEEP
3072:bBAp5XhKpN4eOyVTGfhEClj8jTk+0hq4zRQhF4:GbXE9OiTGfhEClq9boWk
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-