General
-
Target
0d7a1d5c463c2c5608f2eac801e0b4a0
-
Size
99KB
-
Sample
231230-eeah3afcdk
-
MD5
0d7a1d5c463c2c5608f2eac801e0b4a0
-
SHA1
8360738206bf3fd56d40835cc55051e1bc12db85
-
SHA256
93fdfe3b8b318035e8b70b2eef194cd1bc81b08ff5589ad6b73c878b4efe5034
-
SHA512
72d98693173188b503b7a456f18f673f28e6b334cb37ccb1358695a7e64726dad5a54b25c5a6f91692f75296785b80192a7fd000993a492338c5445f03aa678c
-
SSDEEP
3072:847excGxFLPkH9SnbZDazFA1XdqXIX4UtjM:8+eGYtPk0Z+zO/qYM
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-BABE.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
GOLAYA-BABE.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
GOLAYA-BABE.exe
-
Size
149KB
-
MD5
8038ebcd984916c69c58ede697dbe7b4
-
SHA1
94e4561a06e0b423bc5b76c49234a977a869aae8
-
SHA256
ae6226759da82fa559e63bc55b1e62a103c98fae2d246b81d43eae1826c99064
-
SHA512
1acbf5b396f5e88c85ad4e86cf25ad2722f681d42c31bdc113f66c70a8fa6015da20af4a0418e75fbdb350c09c80785fd08e2161b5cdb5ae067636e5715355bf
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hi38puk4NUtjV:AbXE9OiTGfhEClq9qptV
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-