General
-
Target
1124d5f6825e92e77793b0a2acb1a0bc
-
Size
110KB
-
Sample
231230-halx3schbq
-
MD5
1124d5f6825e92e77793b0a2acb1a0bc
-
SHA1
a106765d95a7929c3c3e4d3f2ac65eeeb92f2b7f
-
SHA256
a64bcce861bc1386947c43fa03193ca5a0212934d53c69d0158940abe7a69755
-
SHA512
8e0246d5e18f0c625370152eff602a6b2effd56f7f51c4384dc121b9d70af70db25fa06dbca4fe5b7a53882c78c5cd926d6e03e9f9c89a97f4e7d2dd176e1d51
-
SSDEEP
3072:yrz/BRgd7NTpAb+ratuADH3YckoIrDgEmo:yP/BRgV33atjTkogDV
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-DEVOCHKA.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
GOLAYA-DEVOCHKA.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
GOLAYA-DEVOCHKA.exe
-
Size
238KB
-
MD5
1414a0cf3ae3455f7445753aa9ef0ac9
-
SHA1
c6e63022a267155926638e028ba0bfafe614ff15
-
SHA256
2acd2fd6a3fbb4fe40a62ba571ed6015fdbec4a0a6aec9ccde3f33cbc803fee7
-
SHA512
939e9f2dca756893d04a1619537ee7e71c7eda27ebf9785b16fe0e892327ba23d2bbc54d82b97e590d803ce01d89087eaf24b330572aa5ba14c0668d9faf29b0
-
SSDEEP
6144:zbXE9OiTGfhEClq9rZXpdKw/F4qweYG3/jk8hqfFyBgRY7JJUm:/U9XiuiI
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-