General
-
Target
fada9cb19fe95b3578fb511698fe938155a8a34be79f7c4b501c8275ef6966dc
-
Size
129KB
-
Sample
220919-bryjwaedgj
-
MD5
1873c8994b4b5d5a3119329a7a5271c0
-
SHA1
e5fe2e8dba874551f4c46d7ef6d942a0ab78909b
-
SHA256
fada9cb19fe95b3578fb511698fe938155a8a34be79f7c4b501c8275ef6966dc
-
SHA512
0c083a3e97fb88f77f75cf43fea99b92b74d9b983b801f94633044616c0ec90c145fe256dab8385874a7349fa65425e2de958c2697b98f87b9dc8afca610c42f
-
SSDEEP
3072:n3FBmZAE9zLEDal8aeytZe0xweAfAfBjnPHEYBd+QAAIYNXG:nVsZ59zLE+l8a1meaqBjnPHfKQAAI8XG
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-SEXY.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
GOLAYA-SEXY.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
GOLAYA-SEXY.exe
-
Size
239KB
-
MD5
70145b98f3b3890a6f5989107b1cfef2
-
SHA1
616bd2cebdf266d468807ff2429546f28485249b
-
SHA256
9d3589d93ecdce7415f84ea14ab5df139fd3af4189833c3f45725885e344f3d3
-
SHA512
234249c5c67621693395629afb64e659139518ca1c45b5280c717a7c3dd3bf9fa0c8f4e67972c7a125a9aa9e08955d93b82da06a72e415aedd676111f4bed0de
-
SSDEEP
6144:CbXE9OiTGfhEClq9cpRM1qcVVx/ZsLJJUq:qU9Xiui++7
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-