General
-
Target
79f34bad7dc43ec037c9ebf147a65479
-
Size
99KB
-
Sample
231226-s7hl2aeebj
-
MD5
79f34bad7dc43ec037c9ebf147a65479
-
SHA1
0ee664727feb81901bf1f2c39ebe579c9ffd4cd0
-
SHA256
13632bbedbd872854c94f4cafabb2e9ba3935525e4c25d657e41f5cb476dbbc4
-
SHA512
90f59ca76e4b23e523cc7ad9d2f9f2e419063214d1616b641c48f95dcc32a8ce0cba06eb8967ea257850c17eb32d48d2f9be7332bbbe9162aa1ef63915c3ed72
-
SSDEEP
3072:g47excGxFLPkH9SnbZDan8qEe3lroFbwCTSf9i7ok6q:g+eGYtPk0Z+x8sCToiX6q
Static task
static1
Behavioral task
behavioral1
Sample
PHOTO-GOLAYA.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
PHOTO-GOLAYA.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
PHOTO-GOLAYA.exe
-
Size
149KB
-
MD5
f5114a6a5fac2aaa5993724d1c87edb9
-
SHA1
2a280420019d46fda987f67277053fcf75907ae2
-
SHA256
546198362c7ad11031c368f55fb2a3dde1b373eabcf149381e231ce2acfd0725
-
SHA512
89b0a6d3f95851b42d7c80a681cfcaa8e948a5d8b494816cff2a7bfaec6900846e7f2b6eae567445176f2c61a9b1297bd7a7adbfdc2bcced222236f902f2dc66
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hiiMYWeITf9i7ok6k:AbXE9OiTGfhEClq9OIxiX6k
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-