General
-
Target
10b9bebc3c18f32d668e0d426988f5d6
-
Size
89KB
-
Sample
231224-y66kcsbfe5
-
MD5
10b9bebc3c18f32d668e0d426988f5d6
-
SHA1
51a2a112c68cc9ae4e6395384bc405f870045666
-
SHA256
aeb6370d16a9fdfcb087a7f00bf5f6dc4a04a6dd01d1d1dd2bb2d0c6430f5ca5
-
SHA512
16a05074b16ff8cbe0fbc3b77fb585cc014ea50fc94e9fb31395c11e3959c793a3c0632b710c46f07f3164b4e015532e5ae7df32f1eb695479f1e1746b848aac
-
SSDEEP
1536:Nvg1WKQmK74VzprUxe7kvLSPkIJNE9sq0Qs07tes/nqgxk5B3JxHKJISOuXsdQ5M:NvgEL7Yo4PkH9sIb8s/q6g3COHJ9bCMz
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-SEXY.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
GOLAYA-SEXY.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
GOLAYA-SEXY.exe
-
Size
180KB
-
MD5
b5bfc25ec5d0d2576975e6df14cee8f2
-
SHA1
ff48876248f0f0ff668aa7d67e2243bd9a3fd465
-
SHA256
e39b4d47bafb657aa37f821378b6140e21643173551f0c01adf8dbf4a3f0d748
-
SHA512
aaaafcad061f3ce56aeb0a636fb375dbb8eda5d34e4ce743037ff90ec00b3cd972bbf671881f0a3fb3ab9a03f0782944454f78eed2cf33c72aff2e758e52ce6f
-
SSDEEP
3072:fBAp5XhKpN4eOyVTGfhEClj8jTk+0hD+V64pfPFxI:ibXE9OiTGfhEClq9VzfPFa
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-