General

  • Target

    fada9cb19fe95b3578fb511698fe938155a8a34be79f7c4b501c8275ef6966dc

  • Size

    129KB

  • Sample

    220919-bryjwaedgj

  • MD5

    1873c8994b4b5d5a3119329a7a5271c0

  • SHA1

    e5fe2e8dba874551f4c46d7ef6d942a0ab78909b

  • SHA256

    fada9cb19fe95b3578fb511698fe938155a8a34be79f7c4b501c8275ef6966dc

  • SHA512

    0c083a3e97fb88f77f75cf43fea99b92b74d9b983b801f94633044616c0ec90c145fe256dab8385874a7349fa65425e2de958c2697b98f87b9dc8afca610c42f

  • SSDEEP

    3072:n3FBmZAE9zLEDal8aeytZe0xweAfAfBjnPHEYBd+QAAIYNXG:nVsZ59zLE+l8a1meaqBjnPHfKQAAI8XG

Score
8/10

Malware Config

Targets

    • Target

      GOLAYA-SEXY.exe

    • Size

      239KB

    • MD5

      70145b98f3b3890a6f5989107b1cfef2

    • SHA1

      616bd2cebdf266d468807ff2429546f28485249b

    • SHA256

      9d3589d93ecdce7415f84ea14ab5df139fd3af4189833c3f45725885e344f3d3

    • SHA512

      234249c5c67621693395629afb64e659139518ca1c45b5280c717a7c3dd3bf9fa0c8f4e67972c7a125a9aa9e08955d93b82da06a72e415aedd676111f4bed0de

    • SSDEEP

      6144:CbXE9OiTGfhEClq9cpRM1qcVVx/ZsLJJUq:qU9Xiui++7

    Score
    8/10
    • Blocklisted process makes network request

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks