General
-
Target
afa6cf8d4883e4d066bd047ce08d87575fd406d54041e83c3e2ddaf80d1556a5
-
Size
86KB
-
Sample
221203-caa8paea29
-
MD5
9edd001e37fc1608c370a3c36f5188a8
-
SHA1
daad8b9c91ba60aa2224c4e79a5c823b92c7272d
-
SHA256
afa6cf8d4883e4d066bd047ce08d87575fd406d54041e83c3e2ddaf80d1556a5
-
SHA512
075420931b7425b7053417be90720feae27090fca2339ac780654d886333b4f1c2276fed4bbcbfcaad76e686c059d2fea0efd5a8844596078ab05d4ae8b03420
-
SSDEEP
1536:klfbwimgTY23tG90wIsWfHlWKSd+QSqWU5FdCmCWuKw6kS+AJtBcg9HGULnQxYyb:kl0img13tG90HdQ3SqtRjCT7fmJtBfQF
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-SEXY.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
GOLAYA-SEXY.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
GOLAYA-SEXY.exe
-
Size
181KB
-
MD5
3f0da76b4c682e86aeb9a8a425eaa903
-
SHA1
650b36332381beac233426a3fb4bfeaca92a1296
-
SHA256
ffa647bd5ec34f2f982bd2695abf1be734d323b66617c9e7f8bdaed49832ec6e
-
SHA512
29010590d712e329c322430340c3cd28c88d7242fefebe0f404c04f7eb703351b27c5faf01771259bb768c1ed7d14cf1730f626a372754d6579b91656bdc4c92
-
SSDEEP
3072:YBAp5XhKpN4eOyVTGfhEClj8jTk+0hD+iG+v5y1rF0t8:PbXE9OiTGfhEClq9iktFb
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-