General

  • Target

    c084d63a1ead1edfb2585ad5c6c46671bcf09ae88635a6fb85148b35da05eb07

  • Size

    111KB

  • Sample

    221203-a435fsdf3z

  • MD5

    5453b20a4f15c363dfa36971264ffb33

  • SHA1

    e040f12f65a79197f49f929c2f2f3e2731b3b15f

  • SHA256

    c084d63a1ead1edfb2585ad5c6c46671bcf09ae88635a6fb85148b35da05eb07

  • SHA512

    6113eeda86b440f68312b3079463c289ccc5eb3082b90c463b1c103f06483e0f463c9020be9389eed9711bf90550e341b0ab0eb094af9bf4e725c4e1053a138e

  • SSDEEP

    3072:kl0img13tG90HdQ3Sqt9YacAHRmpuf32KAj4S9v2:kljpD9Q3Tt9Sp4ov2

Score
8/10

Malware Config

Targets

    • Target

      GOLAYA-SEXY.exe

    • Size

      239KB

    • MD5

      9932b8424ae1bc1663264d490bddf2ac

    • SHA1

      7d0ae571d6b5d549d81e8490d9345caae621b912

    • SHA256

      83cbcd25b74ebb00e5bee3d97b1152469d662b35e224f892b5456bbf7d529196

    • SHA512

      070214beaccada100d55d83b11cb7c749a509c9b95a781828acef32bf76ac06fe6382b8020c258d5ca750be6fb0548f826bf4d925cd3604f80d9f8b7624f5c9c

    • SSDEEP

      3072:XBAp5XhKpN4eOyVTGfhEClj8jTk+0hgd5rY4J9UqztfJ4t0873l8ACHxDgeTmzgA:abXE9OiTGfhEClq9Td5roJJUK

    Score
    8/10
    • Blocklisted process makes network request

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks