General
-
Target
2a05b7cb93b3ca63bd50702f8522d047
-
Size
131KB
-
Sample
231225-s4bz3sbcg2
-
MD5
2a05b7cb93b3ca63bd50702f8522d047
-
SHA1
c01ad2d196de971d5a5606bbec368dbe4810e04c
-
SHA256
19ec847acc53e0bd820002da49fd7275d5d4573de2376543fb800183675b8488
-
SHA512
84da2870251c44727a4a47253619404435b9b4d3a8276dcb13a631c717732fc995a794da176e6c4e8d82d35b275d4bfbeb9b7d50c941daff62f16cec8861660b
-
SSDEEP
3072:bnHXMpxcGxFyhQ0bOqYW6Qn6RuhCmIChRkVB8ot7HGgI159As:DHmGY/o0W6Q6R8CshRqB8ot7HGr/N
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-PHOTO.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
GOLAYA-PHOTO.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
GOLAYA-PHOTO.exe
-
Size
239KB
-
MD5
5320277e4c76722726a9e237ae0a0f26
-
SHA1
82c5cb1976639e65d34d3c1e51fa8e63cc067860
-
SHA256
112d224d6a3aa266a091addf132124c66d2c37528bd8c576a761f45cd9d82eda
-
SHA512
5f24a146005f705f7db96dfea7ba6c05c60af5ae40c7ba36b5729650f42440c8b74cc588cc631fe0d656d774cf786b294ff782005d8b9f8991343f74650ffe69
-
SSDEEP
6144:MbXE9OiTGfhEClq9528TfdRoWRg+lNOEJJUm:oU9XiuiJ8DRxl5
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-