General
-
Target
7abf745c48c4f06f482c773bce6cbb244af3299978fbdab9f480b9373b4c2902
-
Size
100KB
-
Sample
221002-2qc5nafdcq
-
MD5
5fce58314265aeb5aa0de39643510140
-
SHA1
a3d4c1fe33101fbdd892ed481b136d9956dde4e5
-
SHA256
7abf745c48c4f06f482c773bce6cbb244af3299978fbdab9f480b9373b4c2902
-
SHA512
c819ed13b142823520a2b596f1bd581917c0a07ef6529526f3618df5b656a591ea433dde8083ddcf5fca939e413b84b8fe2c842a057d8f43665ab4dc383a3db4
-
SSDEEP
3072:m47excGxFLPkH9SnbZDa8RfzzQf+K+sA/ys79aWm:m+eGYtPk0Z+8R72+9/xgWm
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-PHOTO.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
GOLAYA-PHOTO.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
GOLAYA-PHOTO.exe
-
Size
151KB
-
MD5
aaf0874d953648fd0ad4e3c5feafadf4
-
SHA1
7cb3b848597874b9cede25f50384b6a8fb7e6b52
-
SHA256
0dd70b2100074429aaf6cd7e05fc1a59a99b966e7e9cece0bd2c480cf22af506
-
SHA512
874e5dcbcba54fd42360a55b8856c6f4820bd688a2c6ed658a72fd20d359456e08bf020ab86b97027f62b8b08fe0b94ef09b6342ccb8afa695778b45cfeccb1f
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hihuknsA/ys79aWi:AbXE9OiTGfhEClq9Djn9/xgWi
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-