General
-
Target
0d5ba63ef44cc3f4fa07f05b5efb7923ec8fba766e1b07c1d764b218914bfb2d
-
Size
129KB
-
Sample
220919-bwsjesefer
-
MD5
f45bd3bc2188d973cee2860626bc08a6
-
SHA1
8a7a8fc63a7bb229206d23f56e7bc290d755445c
-
SHA256
0d5ba63ef44cc3f4fa07f05b5efb7923ec8fba766e1b07c1d764b218914bfb2d
-
SHA512
d4161834bfd4b911df8c3632e26ff5de0bdeb8f2f04ae73fa77b45af68bccd2c1e2414011ea8db1b97fda47b3d4fe26de625d1b15de1893d209997b41d6a4e10
-
SSDEEP
3072:f3FBmZAE9zLEDal8aeytZe0xweAfAfBjnPHEvx6yFHOQcD/X:fVsZ59zLE+l8a1meaqBjnPHYT3cT
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-SEXY.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
GOLAYA-SEXY.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
GOLAYA-SEXY.exe
-
Size
239KB
-
MD5
146ac45dce81221d82db28de10793609
-
SHA1
262c1b1c7a214d029e08176e62dc91cce12cf0bf
-
SHA256
859b1ec0db6c55f95692c7a95a50e7d40adfe696595567b99c32436ba9af7c38
-
SHA512
49b344399e1aef4bc3493e624831d3c4b7155cdb8f88eb41cb70e9b00d4ebb8234f72e78e030bca6c7616c136b331c42f7fd167025e0d3faca195d2b5bfb7a14
-
SSDEEP
6144:CbXE9OiTGfhEClq9cpRM1qcVVx/Zs3JJUq:qU9Xiui++X
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-