General
-
Target
becb039e5e08d18368e14f441b037dd8a5167afdf7b83bd0866fdfd6242ae8e6
-
Size
86KB
-
Sample
221203-b99d4aea26
-
MD5
2057768c3d38a9d7b651b2864f69c708
-
SHA1
6c3ed900db9cca653a6ee5eeba1e7f526ef53c68
-
SHA256
becb039e5e08d18368e14f441b037dd8a5167afdf7b83bd0866fdfd6242ae8e6
-
SHA512
0e80c00f959262d28910a4265bceac8859d67ec7c187957bbb0159b58fbfc6f5c09cf360b87859ea443fddf09c3c1a2ecb8ca2d45916e7d309bbb8fb7d7064d1
-
SSDEEP
1536:jQwHfvMS0xcGxFyhQkrnb1Mq9WbYdpA+UD5Xb+xzzlgVrOre4pUi8OgfRD:jnHXMpxcGxFyhQ0bOqYM7TU5b+dp2rCC
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-SEXY.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
GOLAYA-SEXY.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
GOLAYA-SEXY.exe
-
Size
180KB
-
MD5
36811975c8783184baa4c6b52e9ef020
-
SHA1
d58d15a044498dd031c0dbd0df2d1b11dda68375
-
SHA256
676e6244d7bb1fe69ab533cbad20f3c0cc57f951041d81d91e445fd726ff57f6
-
SHA512
c9777f95b32240bb8bec608e28e4cbbea4a40233b5409ef6bd508b5f91df8bfd512315db54c642a4807fed0c38ee629f704a10b0d1aea2499a0092c7db381cd9
-
SSDEEP
3072:NBAp5XhKpN4eOyVTGfhEClj8jTk+0hfAWFmEeQqqqqqqqqo/9:IbXE9OiTGfhEClq9K9Q
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-