General
-
Target
881c9c8b7932d0da7615c6f9a8c502e9b1a2bc5436f263e68c74911fbfe748ca
-
Size
100KB
-
Sample
221121-vnglqsdh9t
-
MD5
53279706e510d115fb062cdd97e49b80
-
SHA1
05238d36a4fe563e247e54d89785f6d225ab1c9d
-
SHA256
881c9c8b7932d0da7615c6f9a8c502e9b1a2bc5436f263e68c74911fbfe748ca
-
SHA512
23e0be095aa856d8e63c98691d0b54405f7d76d34c2b9cec3d73ef609d190dc94ebf24d17997190977dcbc6014d4a53f739f72c8bd40649261474f7f47b07ef9
-
SSDEEP
3072:947excGxFLPkH9SnbZDa+I+MY5CS1IjV8pTzbQu8S5wb4CJkEv:9+eGYtPk0Z++I+Rj1PTzbQu88e4Ru
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-SEXY.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
GOLAYA-SEXY.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
GOLAYA-SEXY.exe
-
Size
151KB
-
MD5
ae14978de1c4c3c551a641278bec51fd
-
SHA1
77ac1dd10f8590f513c7bd30e055a3b77308ef45
-
SHA256
482a408215315479d2635fd7726b0278311570eb09bef90b82d1b562f3e0de4c
-
SHA512
4b6d105070199c8d0d3c533ec07f9d28ed35bd79d830295813e8eeded07f032fc6220a57d5c3e4d3a6fd9bc6892e5f531077d2671ad1b6802bd607c63e466b1f
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hi9/rahS5wb4CJkEf:AbXE9OiTGfhEClq9fah8e4RM
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-