General
-
Target
d28fbebc0c31aa2123502a7e98b02bc7c3e2a48fb8ec417a96f0ce7f40c35fe5
-
Size
119KB
-
Sample
221202-chabcsce87
-
MD5
550105a58b689b58f53277d286590c3f
-
SHA1
19d85e8d713b282b0c12acdfb14120404134dd47
-
SHA256
d28fbebc0c31aa2123502a7e98b02bc7c3e2a48fb8ec417a96f0ce7f40c35fe5
-
SHA512
a01ce9a179418b69ddb345e1219e5e7b6bac0494ec1d7623d572695764fb470ce79ce6d089cc8df03d062b0c09928fa5272cf8f8d475519d770ff694d1c17ec3
-
SSDEEP
3072:mnmH0QTs66Kz2gCU8uoLXHJOVL6mBH4mcLM:mnQzZBlMA9lH4mcLM
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-SEXY.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
GOLAYA-SEXY.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
GOLAYA-SEXY.exe
-
Size
237KB
-
MD5
ba2bf7358006651b7f089cf5dd96cd32
-
SHA1
939048fee823c35f23c22aed5dceca97a8be0c85
-
SHA256
21f6371b68404f168d5861e5fde1170eda93d81d86a86cc765bcd30d732b78bc
-
SHA512
c715e72a63150192bbb8a70302512540d7ada89bc08ee50bf7e40eb8d25664d63ac7c3fc9d5dbc145d062e729a06dafe8e67649f0095f426ac8b4ea3156101f3
-
SSDEEP
3072:6BAp5XhKpN4eOyVTGfhEClj8jTk+0h5Y2AGeSw+Cgw5CKHS:JbXE9OiTGfhEClq9AY2AGeGJJUS
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-