General

  • Target

    becb039e5e08d18368e14f441b037dd8a5167afdf7b83bd0866fdfd6242ae8e6

  • Size

    86KB

  • Sample

    221203-b99d4aea26

  • MD5

    2057768c3d38a9d7b651b2864f69c708

  • SHA1

    6c3ed900db9cca653a6ee5eeba1e7f526ef53c68

  • SHA256

    becb039e5e08d18368e14f441b037dd8a5167afdf7b83bd0866fdfd6242ae8e6

  • SHA512

    0e80c00f959262d28910a4265bceac8859d67ec7c187957bbb0159b58fbfc6f5c09cf360b87859ea443fddf09c3c1a2ecb8ca2d45916e7d309bbb8fb7d7064d1

  • SSDEEP

    1536:jQwHfvMS0xcGxFyhQkrnb1Mq9WbYdpA+UD5Xb+xzzlgVrOre4pUi8OgfRD:jnHXMpxcGxFyhQ0bOqYM7TU5b+dp2rCC

Score
8/10

Malware Config

Targets

    • Target

      GOLAYA-SEXY.exe

    • Size

      180KB

    • MD5

      36811975c8783184baa4c6b52e9ef020

    • SHA1

      d58d15a044498dd031c0dbd0df2d1b11dda68375

    • SHA256

      676e6244d7bb1fe69ab533cbad20f3c0cc57f951041d81d91e445fd726ff57f6

    • SHA512

      c9777f95b32240bb8bec608e28e4cbbea4a40233b5409ef6bd508b5f91df8bfd512315db54c642a4807fed0c38ee629f704a10b0d1aea2499a0092c7db381cd9

    • SSDEEP

      3072:NBAp5XhKpN4eOyVTGfhEClj8jTk+0hfAWFmEeQqqqqqqqqo/9:IbXE9OiTGfhEClq9K9Q

    Score
    8/10
    • Blocklisted process makes network request

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v6

Tasks