General

  • Target

    7abf745c48c4f06f482c773bce6cbb244af3299978fbdab9f480b9373b4c2902

  • Size

    100KB

  • Sample

    221002-2qc5nafdcq

  • MD5

    5fce58314265aeb5aa0de39643510140

  • SHA1

    a3d4c1fe33101fbdd892ed481b136d9956dde4e5

  • SHA256

    7abf745c48c4f06f482c773bce6cbb244af3299978fbdab9f480b9373b4c2902

  • SHA512

    c819ed13b142823520a2b596f1bd581917c0a07ef6529526f3618df5b656a591ea433dde8083ddcf5fca939e413b84b8fe2c842a057d8f43665ab4dc383a3db4

  • SSDEEP

    3072:m47excGxFLPkH9SnbZDa8RfzzQf+K+sA/ys79aWm:m+eGYtPk0Z+8R72+9/xgWm

Score
8/10

Malware Config

Targets

    • Target

      GOLAYA-PHOTO.exe

    • Size

      151KB

    • MD5

      aaf0874d953648fd0ad4e3c5feafadf4

    • SHA1

      7cb3b848597874b9cede25f50384b6a8fb7e6b52

    • SHA256

      0dd70b2100074429aaf6cd7e05fc1a59a99b966e7e9cece0bd2c480cf22af506

    • SHA512

      874e5dcbcba54fd42360a55b8856c6f4820bd688a2c6ed658a72fd20d359456e08bf020ab86b97027f62b8b08fe0b94ef09b6342ccb8afa695778b45cfeccb1f

    • SSDEEP

      3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hihuknsA/ys79aWi:AbXE9OiTGfhEClq9Djn9/xgWi

    Score
    8/10
    • Blocklisted process makes network request

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks