General
-
Target
8c38049199ced6eb401d9ff090e51710172d9aa82550f9510fda74996c9d3917
-
Size
113KB
-
Sample
220919-bhn9vadhhr
-
MD5
263450aa7241adc70e7f8b5c691ad448
-
SHA1
b3b5a2eaca0c158a6e693661c5558a6e7b89b191
-
SHA256
8c38049199ced6eb401d9ff090e51710172d9aa82550f9510fda74996c9d3917
-
SHA512
f01abde43412782cf74d322a49c5b4afc07d6918568e59d98e526c8e9d80151fde8b67801ff41b5ff2827752eebe891c140c831c192beb3432a2bcbe3319a4a1
-
SSDEEP
3072:InHXMpxcGxFyhQ0bOqYAmEnFyx9A+NbMekc7AwKcr5GVgxQ:gHmGY/o0AhFyxzQekcl/r5GVmQ
Static task
static1
Behavioral task
behavioral1
Sample
PHOTO-GOLAYA.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
PHOTO-GOLAYA.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
PHOTO-GOLAYA.exe
-
Size
239KB
-
MD5
f4eeb055f29a903de30886496d2399d0
-
SHA1
3f10e04a7b1884382759b252f294b6db527877c6
-
SHA256
802a092b98f19900cc472c08f9bc07009f16197d15f66273be6ae7fe77df0456
-
SHA512
d77d6fca5c1297816150b21c1c1f71080a273a2512dd657a2eff159070ff66c8fd9b7531c2f0230f489fec35a12646f9940fc3d3d4ba00b2a191a1c84454a567
-
SSDEEP
6144:sbXE9OiTGfhEClq9zrd52hTDOC661lYQawJJUq:IU9Xiuix1lYQaS
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-