General
-
Target
07e1538f3d10a4022dbdb9c6bc68ddf4
-
Size
129KB
-
Sample
231224-vsye2sgdap
-
MD5
07e1538f3d10a4022dbdb9c6bc68ddf4
-
SHA1
b31b97d04c6c4cf44a3732f7288f755d6a54a4e1
-
SHA256
96afed80ba9f7777dd1cdf543be47cb80129117472409e8f3e2235d5d6bf000b
-
SHA512
8386f3b8fca45c2b66dbb1e7d856ad0cd8b25343acf889396e6e47a6f8f7f08d10fdc1506418e1bb6c420334f27d31e2aaea5e29b8f5c055e69e3b0e010086a7
-
SSDEEP
3072:f3FBmZAE9zLEDal8aeytZe0xweAfAfBjnPHEYBd+QAAIYNR:fVsZ59zLE+l8a1meaqBjnPHfKQAAI8R
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-TOPLESS.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
GOLAYA-TOPLESS.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
GOLAYA-TOPLESS.exe
-
Size
239KB
-
MD5
70145b98f3b3890a6f5989107b1cfef2
-
SHA1
616bd2cebdf266d468807ff2429546f28485249b
-
SHA256
9d3589d93ecdce7415f84ea14ab5df139fd3af4189833c3f45725885e344f3d3
-
SHA512
234249c5c67621693395629afb64e659139518ca1c45b5280c717a7c3dd3bf9fa0c8f4e67972c7a125a9aa9e08955d93b82da06a72e415aedd676111f4bed0de
-
SSDEEP
6144:CbXE9OiTGfhEClq9cpRM1qcVVx/ZsLJJUq:qU9Xiui++7
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-