General
-
Target
05869b7a91b15407178cf9918aa67f0f
-
Size
99KB
-
Sample
231224-twnjksafdk
-
MD5
05869b7a91b15407178cf9918aa67f0f
-
SHA1
7485d9b81e7016ac46a1b4a909d9e1f152c49acb
-
SHA256
675bd765b247a4d267be18a8d76643e062cdb5639ca0c79062c81675b840ff6e
-
SHA512
49ed26fbc7b59144cdb4eb2584eb0b107218696cd2f2feab164d5adbfdf835719eea2172b1091ce9c61c821d24afeb43b3c18aae4ad7d165b73172fa9c2da179
-
SSDEEP
3072:347excGxFLPkH9SnbZDa6mRvNe3L9XPFgoDgTpLnN6:3+eGYtPk0Z+jsL1PFgoDgJno
Static task
static1
Behavioral task
behavioral1
Sample
PHOTO-GOLAYA.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
PHOTO-GOLAYA.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
PHOTO-GOLAYA.exe
-
Size
149KB
-
MD5
ccca394b1369e766c53346550b481c57
-
SHA1
47dccd3fc9b7bf7c98f75fa11725089d5a977b4c
-
SHA256
211901e1229d7b816754146ff8d7167e8a92211afe63dc44eb8056d0b054a12a
-
SHA512
98625c9dd7cc8b57609ce20f6f295dc8704a75b49cde806ddbbb040cf3832028425bed0cd0da0c501508fabd2cdc59cd1717fa948362281848ed4ba798990712
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hisUwxgTpLnNq:AbXE9OiTGfhEClq9TwxgJn0
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-