General

  • Target

    75cc9066c1c6bb04b2d7935a3a450aec1200e232690d3576c7ad91e938345127

  • Size

    99KB

  • Sample

    221001-y6mr9aebe2

  • MD5

    6b275aa67f9294cf91f73f81af2a16d0

  • SHA1

    02c2a7383e4d2c223b9d5271f39e49bf4fa951d7

  • SHA256

    75cc9066c1c6bb04b2d7935a3a450aec1200e232690d3576c7ad91e938345127

  • SHA512

    97adf9f87b3dd3b8939837845c55cc4a7f82090a3fa769ab7b1a413e73a9cc9c2c35e3b5384619bbbb048ecae550e8f9833ba6195ad83b6a9c332edf968c78b6

  • SSDEEP

    3072:P47excGxFLPkH9SnbZDa2a0paMyVlk0Vff+PlWfoBn:P+eGYtPk0Z+k0Vff+Pl5

Score
8/10

Malware Config

Targets

    • Target

      GOLAYA-SEXY.exe

    • Size

      149KB

    • MD5

      082651eefe9806f50fb938f393148d45

    • SHA1

      61817d9547cbfc0490511c8599261b62adbc61fa

    • SHA256

      dd854c4d604f2add306b0e004097c9fb897b4107f02407d4b521abbc22919bbd

    • SHA512

      3c8cd68bd19fb0fbb40ed1a5f53d7f83f152c4aced62e137bd7771303da26a4e74ce2648958909f2f92506ea2508665d7139a11b0568740104df87b68bcaf994

    • SSDEEP

      3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hiIvh5iBZ:AbXE9OiTGfhEClq9SE

    Score
    8/10
    • Blocklisted process makes network request

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks