General
-
Target
0d0c89fb59fca5b5cd93d40a211f5e07
-
Size
79KB
-
Sample
231230-d3nvxsfbf9
-
MD5
0d0c89fb59fca5b5cd93d40a211f5e07
-
SHA1
6584822c216014f933b29ee72368f9a252ef8a28
-
SHA256
cd50c195876631bb2f60930f6d2a513485a771e35e79327c66fc28b30cdb736d
-
SHA512
4d8cf3da7946ce8b14a0d5cd98ff516344d55b53f4ae0f64edf34381143b4cff90a5330882920ef3eef75d590d5806484e21778cd10ad4b1ec9525cbd43f601a
-
SSDEEP
1536:tvg1WKQmK74VzprUxe7kvLSPkIJNE9sq0Qs07t+vhAUqHRKKXPTKFnmq/MH5YEAN:tvgEL7Yo4PkH9sIbMpAxQKXP+Fr/MHNI
Static task
static1
Behavioral task
behavioral1
Sample
PHOTO-GOLAYA.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
PHOTO-GOLAYA.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
PHOTO-GOLAYA.exe
-
Size
180KB
-
MD5
05dcabe4947ada380eb48cf90eb0aa6f
-
SHA1
d11c9319a518ddc14dc62cc138d074b1d908c924
-
SHA256
53b296ba46752bf57d298dfe5ba8b011574253199e57ffd8c8786bb16f642f49
-
SHA512
a336ca962fe97f329fa6968e2532096a0051e5f124c20c7ba74d6688e5b15b2f34980b56f2b6f1e5ff3a53a05936510f22841279497ca50061e5c3fc55ea1614
-
SSDEEP
3072:nBAp5XhKpN4eOyVTGfhEClj8jTk+0hJiH8ga2EPb9ePlO7/IQ1bvatjKv5sK2DdH:qbXE9OiTGfhEClq9j8ga2+b9ePlO7/IR
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-