General
-
Target
c084d63a1ead1edfb2585ad5c6c46671bcf09ae88635a6fb85148b35da05eb07
-
Size
111KB
-
Sample
221203-a435fsdf3z
-
MD5
5453b20a4f15c363dfa36971264ffb33
-
SHA1
e040f12f65a79197f49f929c2f2f3e2731b3b15f
-
SHA256
c084d63a1ead1edfb2585ad5c6c46671bcf09ae88635a6fb85148b35da05eb07
-
SHA512
6113eeda86b440f68312b3079463c289ccc5eb3082b90c463b1c103f06483e0f463c9020be9389eed9711bf90550e341b0ab0eb094af9bf4e725c4e1053a138e
-
SSDEEP
3072:kl0img13tG90HdQ3Sqt9YacAHRmpuf32KAj4S9v2:kljpD9Q3Tt9Sp4ov2
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-SEXY.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
GOLAYA-SEXY.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
GOLAYA-SEXY.exe
-
Size
239KB
-
MD5
9932b8424ae1bc1663264d490bddf2ac
-
SHA1
7d0ae571d6b5d549d81e8490d9345caae621b912
-
SHA256
83cbcd25b74ebb00e5bee3d97b1152469d662b35e224f892b5456bbf7d529196
-
SHA512
070214beaccada100d55d83b11cb7c749a509c9b95a781828acef32bf76ac06fe6382b8020c258d5ca750be6fb0548f826bf4d925cd3604f80d9f8b7624f5c9c
-
SSDEEP
3072:XBAp5XhKpN4eOyVTGfhEClj8jTk+0hgd5rY4J9UqztfJ4t0873l8ACHxDgeTmzgA:abXE9OiTGfhEClq9Td5roJJUK
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-