General
-
Target
7208322219279e2de9d1ec16d539a2c9
-
Size
89KB
-
Sample
231226-qmfwlahbbl
-
MD5
7208322219279e2de9d1ec16d539a2c9
-
SHA1
3700c1460f00a1c84a78ed4e13f7d9b5fea58e87
-
SHA256
25159e54b5c7c5a63347b5afc0ea7931dec5b16de16cfb53806d7148b13a7192
-
SHA512
e126dd0a2daf879c78fdd9b00f899dd5da545a5ad4299fc302e9cc08e0088acc7b605d3943a325908536862fcafe597db35eba3d404afd8d31ca20b23d9731fa
-
SSDEEP
1536:mvg1WKQmK74VzprUxe7kvLSPkIJNE9sq0Qs07tes/nqgxk5B3JxHKJISOuXsdQ5d:mvgEL7Yo4PkH9sIb8s/q6g3COHJ9bCMm
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-DEVOCHKA.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
GOLAYA-DEVOCHKA.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
GOLAYA-DEVOCHKA.exe
-
Size
180KB
-
MD5
b5bfc25ec5d0d2576975e6df14cee8f2
-
SHA1
ff48876248f0f0ff668aa7d67e2243bd9a3fd465
-
SHA256
e39b4d47bafb657aa37f821378b6140e21643173551f0c01adf8dbf4a3f0d748
-
SHA512
aaaafcad061f3ce56aeb0a636fb375dbb8eda5d34e4ce743037ff90ec00b3cd972bbf671881f0a3fb3ab9a03f0782944454f78eed2cf33c72aff2e758e52ce6f
-
SSDEEP
3072:fBAp5XhKpN4eOyVTGfhEClj8jTk+0hD+V64pfPFxI:ibXE9OiTGfhEClq9VzfPFa
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-