General
-
Target
70baaa7ca61940bfc9f9c4ae2f2ffbb9fdd6d86193195c5850a9a94ea3c8fdac
-
Size
110KB
-
Sample
221205-3hv6yabd6t
-
MD5
1047c35a03e5be5143149c62d359a8f6
-
SHA1
3c4cd843e6f72f2d6fdd70ccdfc4c502d99b31e1
-
SHA256
70baaa7ca61940bfc9f9c4ae2f2ffbb9fdd6d86193195c5850a9a94ea3c8fdac
-
SHA512
0f10d2c303f476d0ee31e201ae76361e64ef11bf0ec9af76f061deb4e521412f1bafb03acac96283ee2e9dd2409809ae8ea81d3f8bbc09047a769e6e2805ba55
-
SSDEEP
3072:Mrz/BRgd7NTpAb+ratuADH3Ahlytd73SH3EQ:MP/BRgV33atjily3K0Q
Static task
static1
Behavioral task
behavioral1
Sample
PHOTO-GOLAYA.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
PHOTO-GOLAYA.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
PHOTO-GOLAYA.exe
-
Size
238KB
-
MD5
a66f1eff17dda44a3287ea082faa5bfa
-
SHA1
fcb18b2525543cb892aca3ab5d1973b9319ec9aa
-
SHA256
62889e736683cfdce0feca1622b0cc5e0fda07214a7e678768d8cc8d5e7396fb
-
SHA512
56007cd2911948791c9f1b1e53c4da6925be75fc3acdd9bc54940a9775974245cd2973284205d71a98ae80958febe59fee323af0746ec393d987b957be7a78b3
-
SSDEEP
6144:zbXE9OiTGfhEClq9rZXpdKw/F4qweYG3/jk8hqfFyBgRYGJJUm:/U9Xiuif
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-