General
-
Target
20c764fae0ac268f02dc26a5a6c7b1a6c3aa21b93fdfd2f314ab32bcb41ab37a
-
Size
122KB
-
Sample
220919-bhd4wadhgr
-
MD5
f935da63be8933581ce10c9d9e3b57ba
-
SHA1
4f6c6ad89f5788d7f60bdf13f607aa954f23111b
-
SHA256
20c764fae0ac268f02dc26a5a6c7b1a6c3aa21b93fdfd2f314ab32bcb41ab37a
-
SHA512
26f95e69712f6a3c58743eef56af3c7eee81f74549129948381985c04690a2b6930bf40a06a33f48a7ac887459a9a06b2cf7266b7110470fdca78c01685a32d2
-
SSDEEP
3072:5nHXMpxcGxFyhQ0bOqYJWd8qTkF9ec5KqqA5TYUC9o8:lHmGY/o0J0T0d5KY5EUoo8
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-SEXY.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
GOLAYA-SEXY.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
GOLAYA-SEXY.exe
-
Size
237KB
-
MD5
ae0c17f7a514abdf3d6c43f49c25f91c
-
SHA1
a4299a862e43b05c4b5ad9f9db4242c9255f2213
-
SHA256
a935f0ceb0e9d028daa25a26179b537e6da44b39057ef908994af2a99e4f1b7c
-
SHA512
9040aba49207c043d226327dccf5d02e2e6b47bc912ef40450969ffb3920010b9a90e73d2403ea8a76162497e31a65a787c3c25cd9e7d2ab925f6fe863be1acc
-
SSDEEP
3072:DBAp5XhKpN4eOyVTGfhEClj8jTk+0hT6IPEaG562E3nV9uVSUO2U+Cgw5CKHq:ubXE9OiTGfhEClq9gTudJJUq
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-