General
-
Target
023c87a1b248c168ef0cda1d231a1dd1_JaffaCakes118
-
Size
91KB
-
Sample
240930-trclhsycng
-
MD5
023c87a1b248c168ef0cda1d231a1dd1
-
SHA1
88852b2a58c1d283d485a515a2214a528d8c9958
-
SHA256
bc1532116c247d03810ad655366bc1808f9368297f665671535d613cce59a348
-
SHA512
8ca307664a0a4f46922479b062233e0e007e28e302b7f6750784b154cd792dc1d5ce3bbee233f807454ad5be7a28878747f56f3dd02d1f4aa7197c295a9b0e21
-
SSDEEP
1536:wQwHfvMS0xcGxFyhQkrnb1Mq9WbJOnMA+txGFCr6cXp4xkPdh2B3Se7yN5X:wnHXMpxcGxFyhQ0bOqYuc6c7P6g
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-DEVOCHKA.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
GOLAYA-DEVOCHKA.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
GOLAYA-DEVOCHKA.exe
-
Size
180KB
-
MD5
63f222fa3dec54c99fa71bfbef798cab
-
SHA1
a6aa7dca45be30f5f1f0a2c0cf24c15637fe33f4
-
SHA256
47bfc569cb27c9596d81d144a9af37d5f378dcdaf73d6c416b86362739354b8f
-
SHA512
75c8086cd6dce1433e426f8f65d893130847b0ded224a4c6f26ebc6ee1ef9a33299da4f8902067697717b3cd8e4a855018929fb8d562c9581e79d023ae46e2df
-
SSDEEP
3072:eBAp5XhKpN4eOyVTGfhEClj8jTk+0h+tzYOuIPA:1bXE9OiTGfhEClq9dYpII
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-