General

  • Target

    10b9bebc3c18f32d668e0d426988f5d6

  • Size

    89KB

  • Sample

    231224-y66kcsbfe5

  • MD5

    10b9bebc3c18f32d668e0d426988f5d6

  • SHA1

    51a2a112c68cc9ae4e6395384bc405f870045666

  • SHA256

    aeb6370d16a9fdfcb087a7f00bf5f6dc4a04a6dd01d1d1dd2bb2d0c6430f5ca5

  • SHA512

    16a05074b16ff8cbe0fbc3b77fb585cc014ea50fc94e9fb31395c11e3959c793a3c0632b710c46f07f3164b4e015532e5ae7df32f1eb695479f1e1746b848aac

  • SSDEEP

    1536:Nvg1WKQmK74VzprUxe7kvLSPkIJNE9sq0Qs07tes/nqgxk5B3JxHKJISOuXsdQ5M:NvgEL7Yo4PkH9sIb8s/q6g3COHJ9bCMz

Score
8/10

Malware Config

Targets

    • Target

      GOLAYA-SEXY.exe

    • Size

      180KB

    • MD5

      b5bfc25ec5d0d2576975e6df14cee8f2

    • SHA1

      ff48876248f0f0ff668aa7d67e2243bd9a3fd465

    • SHA256

      e39b4d47bafb657aa37f821378b6140e21643173551f0c01adf8dbf4a3f0d748

    • SHA512

      aaaafcad061f3ce56aeb0a636fb375dbb8eda5d34e4ce743037ff90ec00b3cd972bbf671881f0a3fb3ab9a03f0782944454f78eed2cf33c72aff2e758e52ce6f

    • SSDEEP

      3072:fBAp5XhKpN4eOyVTGfhEClj8jTk+0hD+V64pfPFxI:ibXE9OiTGfhEClq9VzfPFa

    Score
    8/10
    • Blocklisted process makes network request

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks