General
-
Target
1026b915fb089fc1e1ac52984b2f9067826bb4e9058697b638511450f1b26264
-
Size
98KB
-
Sample
220919-wbm4esegaj
-
MD5
41f1a672b0046b07758ef146452583c3
-
SHA1
0a8be78f09f182cf0df8d90d8c1ca1dc99af5aed
-
SHA256
1026b915fb089fc1e1ac52984b2f9067826bb4e9058697b638511450f1b26264
-
SHA512
ba6956196b12a09a3fa3bdc25a6e848e960b722cd93718dfd16f516f2a9cf759133228620349544b53684bafdfae644cd7446457be7ee523077a6e6acde892d0
-
SSDEEP
3072:Y47excGxFLPkH9SnbZDaKag1F0JYEZtpAh3:Y+eGYtPk0Z+Q1+ah3
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-PHOTO.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
GOLAYA-PHOTO.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
GOLAYA-PHOTO.exe
-
Size
149KB
-
MD5
13135ec7bee7db877b3654059374ebde
-
SHA1
f3f3a8c6b395211ebdbb2a73769e21c401d34e0c
-
SHA256
7dbe9bdea098a5cb0608135c1705d2aa2e080ebc4146a02001a793ff0970252a
-
SHA512
3f7eb418322b1abbe60b2fa6845ffb3e530808739b0dc542707c713f83bc4b02a4a1568a28e9badeb71bd5512e14a47387abe80b2edf0b440f2c40cc3cc08db8
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hiqtAhp:AbXE9OiTGfhEClq9QtAhp
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-