General
-
Target
eb3012a06e1c237046c89da869f3ce610b2af1e36312f20618e45fbad3e2519a
-
Size
91KB
-
Sample
221202-wda7msdf7w
-
MD5
4cf261b6abd20d43a72db9ba7f3a09a7
-
SHA1
02bb7e94cd42d79913797f575af66746b7e4711c
-
SHA256
eb3012a06e1c237046c89da869f3ce610b2af1e36312f20618e45fbad3e2519a
-
SHA512
b3d71e8521ae9c68c1e66dd8358ff15ba9562fc32e1c29584e2604c926647978cffbedfaf9766079a33d579163a63e2dd96ef9d557e0a73a373db6111175c428
-
SSDEEP
1536:KUnVN5HOHUEs6iqcuyIJ4fnb07w3317NIf8n5zBWOurXjBCl9b2WGA+ZetAoSaCp:KUnLYCq/Fufnb07YO86X7jcl8WMtaCp
Static task
static1
Behavioral task
behavioral1
Sample
PHOTO-GOLAYA.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
PHOTO-GOLAYA.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
PHOTO-GOLAYA.exe
-
Size
180KB
-
MD5
0807cdca2c7e165f7b0a11e4c9c1e782
-
SHA1
8e0238ff51d78cdbaf8df22983f98a60e5600ac9
-
SHA256
39e6435fa4030a9252678a3fb31b7a76dddd85e1a1dcfb5446fe0907a8918dc2
-
SHA512
1ebaf822e01e7f19f0af134cbedfc8d738f36f0fc89419bf0c46ff0d2002aafdd314074f42f0dbdaa67a92614ff1438480087958c4e9c6dc5e553bf8c98a5f2d
-
SSDEEP
3072:kBAp5XhKpN4eOyVTGfhEClj8jTk+0hkflw/doa/kW1uTJ:zbXE9OiTGfhEClq9FfqoacWETJ
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-