General
-
Target
2a8c7bff18f8ff1f4fd417f2533756a271dffd36d08ae515de4aeb9e8cd9103c
-
Size
99KB
-
Sample
220919-wglsjsbcc9
-
MD5
ee2ba5e7bfb05f66a387939d50c8973e
-
SHA1
703a9e4c30698ff8129a27957a45f849ab5d04fd
-
SHA256
2a8c7bff18f8ff1f4fd417f2533756a271dffd36d08ae515de4aeb9e8cd9103c
-
SHA512
47287bc300f46fe8bf7125c30007628d74e47fc5efe1c354f365c8e12a7ef17e37963010d7010a30373653c43c4b71e58050762deac517077441981633570f87
-
SSDEEP
3072:B47excGxFLPkH9SnbZDabWDLZKTOrvn7BWM:B+eGYtPk0Z+8Lhrvn4M
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-PHOTO.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
GOLAYA-PHOTO.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
GOLAYA-PHOTO.exe
-
Size
149KB
-
MD5
ff086d0d59b161c9b6c042e902323622
-
SHA1
a5533ae498366582e9b08cc28821ffd1e00f92a7
-
SHA256
abdc11a0da5cdc6e005a8fa09cf6398ec337cf7801cf5231e50e987345812ea3
-
SHA512
c779d69cad19597bf9a619d6f4599d7df4219d77e6144ee694c5076db56013e34781a691d93e6caac15a861b404bc1c15fdce8e70cb02b90ed7a0cc7015738a6
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hieh/zn7BWR:AbXE9OiTGfhEClq9Mh/zn4R
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-