General
-
Target
de0e3af5b42f7b0942c666829a5c2602d8c41776d5dcb3d113a3b61beed95a29
-
Size
99KB
-
Sample
220919-vzvyhaacf5
-
MD5
6531ebef5368765a3122040ffe8aee6a
-
SHA1
1c92592313c19ca97e16fece83c29729c5d69d3c
-
SHA256
de0e3af5b42f7b0942c666829a5c2602d8c41776d5dcb3d113a3b61beed95a29
-
SHA512
c599fc48230c4422fb3d1022f4e00303f058ce2610b8fc11b363ed1590ab55002ad6a6bd2b20a8ef2412937e03e4fce2df858bc70b341b99bb6b1bb10f906ebd
-
SSDEEP
3072:D47excGxFLPkH9SnbZDa2a0paMyVlk0Vff+PlWfoBn:D+eGYtPk0Z+k0Vff+PlV
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-SEXY.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
GOLAYA-SEXY.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
GOLAYA-SEXY.exe
-
Size
149KB
-
MD5
082651eefe9806f50fb938f393148d45
-
SHA1
61817d9547cbfc0490511c8599261b62adbc61fa
-
SHA256
dd854c4d604f2add306b0e004097c9fb897b4107f02407d4b521abbc22919bbd
-
SHA512
3c8cd68bd19fb0fbb40ed1a5f53d7f83f152c4aced62e137bd7771303da26a4e74ce2648958909f2f92506ea2508665d7139a11b0568740104df87b68bcaf994
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hiIvh5iBZ:AbXE9OiTGfhEClq9SE
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-