General
-
Target
1ac297877e6c05725bc74116d34dae5711a8f0edba29b3fc44c14f570c749742
-
Size
116KB
-
Sample
221020-trh4ascher
-
MD5
5da986fdf85b8e0f4f7cd16de1d5e890
-
SHA1
c4ef70a6583e5f48580fb1ecd9a9add9a2008963
-
SHA256
1ac297877e6c05725bc74116d34dae5711a8f0edba29b3fc44c14f570c749742
-
SHA512
8e662880402436f4e2302da859f0e4317b4898742b367061adc9fbddbd850bc829e46fe0b9d80338c1f037e063db93bd3bc45f737a946607ae16a463a632af45
-
SSDEEP
3072:2bFcEq/FuXeTBZZTVUsYfwO8zDDvLp1ZfRfVv0gr:2Rcn0eTBZZxUJfwlDvtN9sM
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-PHOTO.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
GOLAYA-PHOTO.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
GOLAYA-PHOTO.exe
-
Size
174KB
-
MD5
940ea74edf627c19f88627fc5da79fb9
-
SHA1
cf4c85022398b7833fcd96b639043dabfca6bc0b
-
SHA256
0d5428b43606d785e233906a461c345a3c233ec35e4aba381f91df5c935a99bb
-
SHA512
7e6e7e0d379e316cd7efa0e931d3e0b409994cd49b52c43b3d211c9cb2a5db3610824db76e8f4d3ee9fbf65710e60e1e7ba20a32e46d525cdef205b078501960
-
SSDEEP
3072:ABAp5XhKpN4eOyVTGfhEClj8jTk+0hAeFFq4jMY1ZfRfVv0Rw:3bXE9OiTGfhEClq95YN9se
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-