General
-
Target
28a3ae139104a833e466c51e3263c4e6
-
Size
122KB
-
Sample
231231-fb5epseccj
-
MD5
28a3ae139104a833e466c51e3263c4e6
-
SHA1
b3190f109d28d2aa7f1af4d011bf57bf37d32d46
-
SHA256
f34895f36ec33f4d689e137b609beb85137cc7976dcbbaa3bd9a544b3b8f5770
-
SHA512
c4039ef57eed299f6fa3a362fa907e16b58482ceb6552d8d011bd13d8e7a51be5089d1626af7b792bc173854d330b422b59c97a34870ebe0fae84180ccd67e90
-
SSDEEP
3072:vnHXMpxcGxFyhQ0bOqYhGO1PgN7Hn9LeXrfit3R6jyTZ6WxO:vHmGY/o0hGO2JdL2I3cXWxO
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-DEVOCHKA.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
GOLAYA-DEVOCHKA.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
GOLAYA-DEVOCHKA.exe
-
Size
238KB
-
MD5
4bf7fbae5d85b68dba3a92e172504238
-
SHA1
641a659c755e3adafa971a3f32c6e47b4f5f1173
-
SHA256
2e8efaea895111c02f1efddb99fa07fdd1e9c2318d488ae6c9b27064f6c0feac
-
SHA512
93e67706c4d5ffd05de586f612c8af211630921e2b91b5ec488a734fa951835caab543da76160f21bec8160473017857bcdd5625440a9247279986d05468e96d
-
SSDEEP
6144:zbXE9OiTGfhEClq9dqCvR/w/3E616xKJJUm:/U9XiuiURI/ss
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-