General
-
Target
ba068ea0a1abc1615338dfc5c23fcb50
-
Size
123KB
-
Sample
240308-ahwhgsba51
-
MD5
ba068ea0a1abc1615338dfc5c23fcb50
-
SHA1
0e8fb052eacb361b279321224a81e66ac855e9c3
-
SHA256
8a873e0af2e3b2190420ce21cc529ecb38b2e93d23e84409a3aec2bdce27ab74
-
SHA512
4602094477634b5cc9cfe4f885622364206317b2048a06427c68b4eafdfb64b8b84cce04f4b2618e6dcca8dfe52de2055ec6d51c673c56acea36d5bab85f5d7c
-
SSDEEP
1536:IUnVN5HOHUEs6iqcuyIJ4fnb07w3317NT0+5hNsMJhFHaj+Plyx0du/BSSTrDNPK:IUnLYCq/Fufnb07YfLzJhFw0YRUNebUl
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-DEVOCHKA.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
GOLAYA-DEVOCHKA.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
GOLAYA-DEVOCHKA.exe
-
Size
238KB
-
MD5
abba37efd3a03df55c6a615e9762f9e5
-
SHA1
0cbd015b62ef4a188e29d5ccc82eff6dbb75e02e
-
SHA256
47a9d86207338ad60e9820fe3c947485290d6138540354fd741747395229875d
-
SHA512
31c133da63cde479a2e16a4472a8c9bdc98db41750bc594e4165e30c87767d845dd4ecd40e064760bc1e04208f267ba0c63a8651f7278b8c2c3d29b00159cf74
-
SSDEEP
3072:TBAp5XhKpN4eOyVTGfhEClj8jTk+0hFHPhnw4NSmNjxXyAIVragLR+ncvLn1l+C6:+bXE9OiTGfhEClq9cyHO9XFAugLKJJUm
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-