General

  • Target

    f97af6cc0dca787911127d662a400ebeba17790e35af2852ee0652cc839809dd

  • Size

    100KB

  • Sample

    221019-swnc5sdga5

  • MD5

    a1041874c610d230f9e14d1fe78cf660

  • SHA1

    a32a38739880ab3e8e71250429549a59f1e896c4

  • SHA256

    f97af6cc0dca787911127d662a400ebeba17790e35af2852ee0652cc839809dd

  • SHA512

    20618f4d9f6dea0422d4bd3704d35da44dd70f9704cae14767b9c3c43371b3472dfacc8cd9d8e6666d8f35baa780873792ab22be10102e76039f223d058de548

  • SSDEEP

    3072:j47excGxFLPkH9SnbZDa8RfzzQf+K+sA/ys79aWO:j+eGYtPk0Z+8R72+9/xgWO

Score
8/10

Malware Config

Targets

    • Target

      GOLAYA-SEXY.exe

    • Size

      151KB

    • MD5

      aaf0874d953648fd0ad4e3c5feafadf4

    • SHA1

      7cb3b848597874b9cede25f50384b6a8fb7e6b52

    • SHA256

      0dd70b2100074429aaf6cd7e05fc1a59a99b966e7e9cece0bd2c480cf22af506

    • SHA512

      874e5dcbcba54fd42360a55b8856c6f4820bd688a2c6ed658a72fd20d359456e08bf020ab86b97027f62b8b08fe0b94ef09b6342ccb8afa695778b45cfeccb1f

    • SSDEEP

      3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hihuknsA/ys79aWi:AbXE9OiTGfhEClq9Djn9/xgWi

    Score
    8/10
    • Blocklisted process makes network request

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks