General
-
Target
GoldenSpy (14)
-
Size
4.3MB
-
Sample
211020-q3gg3aaadl
-
MD5
4fc56dd3b3875cda5708451f756426b3
-
SHA1
5c2064f8fa1dd0268e50a1c33f14a30694640d36
-
SHA256
c5c5e59bb18bad1427714d0007b676e658d8e08faf5a0632ed88912f5816d525
-
SHA512
402ec7e11421f4e0dfb4706888aa904952caaa7ceb41caac21f982c8bb63f80700ace41139edb89f0b42805c6c88c07746b15a37e0eee6db0e1d61a955362eed
Static task
static1
Malware Config
Targets
-
-
Target
GoldenSpy (14)
-
Size
4.3MB
-
MD5
4fc56dd3b3875cda5708451f756426b3
-
SHA1
5c2064f8fa1dd0268e50a1c33f14a30694640d36
-
SHA256
c5c5e59bb18bad1427714d0007b676e658d8e08faf5a0632ed88912f5816d525
-
SHA512
402ec7e11421f4e0dfb4706888aa904952caaa7ceb41caac21f982c8bb63f80700ace41139edb89f0b42805c6c88c07746b15a37e0eee6db0e1d61a955362eed
-
GoldenSpy Payload
-
suricata: ET MALWARE GoldenSpy Domain Observed
suricata: ET MALWARE GoldenSpy Domain Observed
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-