General
-
Target
f97af6cc0dca787911127d662a400ebeba17790e35af2852ee0652cc839809dd
-
Size
100KB
-
Sample
221019-swnc5sdga5
-
MD5
a1041874c610d230f9e14d1fe78cf660
-
SHA1
a32a38739880ab3e8e71250429549a59f1e896c4
-
SHA256
f97af6cc0dca787911127d662a400ebeba17790e35af2852ee0652cc839809dd
-
SHA512
20618f4d9f6dea0422d4bd3704d35da44dd70f9704cae14767b9c3c43371b3472dfacc8cd9d8e6666d8f35baa780873792ab22be10102e76039f223d058de548
-
SSDEEP
3072:j47excGxFLPkH9SnbZDa8RfzzQf+K+sA/ys79aWO:j+eGYtPk0Z+8R72+9/xgWO
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-SEXY.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
GOLAYA-SEXY.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
GOLAYA-SEXY.exe
-
Size
151KB
-
MD5
aaf0874d953648fd0ad4e3c5feafadf4
-
SHA1
7cb3b848597874b9cede25f50384b6a8fb7e6b52
-
SHA256
0dd70b2100074429aaf6cd7e05fc1a59a99b966e7e9cece0bd2c480cf22af506
-
SHA512
874e5dcbcba54fd42360a55b8856c6f4820bd688a2c6ed658a72fd20d359456e08bf020ab86b97027f62b8b08fe0b94ef09b6342ccb8afa695778b45cfeccb1f
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hihuknsA/ys79aWi:AbXE9OiTGfhEClq9Djn9/xgWi
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-