General
-
Target
3f16a7e85df9a6c916861760f669f2e5
-
Size
99KB
-
Sample
240103-1he4lsbadl
-
MD5
3f16a7e85df9a6c916861760f669f2e5
-
SHA1
a40cbcc0b251d652ed69e12f259acc7282a6efea
-
SHA256
a507dc1c55212a916cf051c0e28681ff01f931a476b0d5855ca650f109126531
-
SHA512
17e18cc87758239d0cff95c13854a107567c256ee8a9e6b6ab42f3c917ab01aeaf3c1600e77ae578e505d4116314c6212756f2317caf9121e247c6f4655ac25c
-
SSDEEP
3072:K47excGxFLPkH9SnbZDa6mRvNe3L9XPFgoDgTpLnN9:K+eGYtPk0Z+jsL1PFgoDgJnz
Static task
static1
Behavioral task
behavioral1
Sample
PHOTO-GOLAYA.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
PHOTO-GOLAYA.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
PHOTO-GOLAYA.exe
-
Size
149KB
-
MD5
ccca394b1369e766c53346550b481c57
-
SHA1
47dccd3fc9b7bf7c98f75fa11725089d5a977b4c
-
SHA256
211901e1229d7b816754146ff8d7167e8a92211afe63dc44eb8056d0b054a12a
-
SHA512
98625c9dd7cc8b57609ce20f6f295dc8704a75b49cde806ddbbb040cf3832028425bed0cd0da0c501508fabd2cdc59cd1717fa948362281848ed4ba798990712
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hisUwxgTpLnNq:AbXE9OiTGfhEClq9TwxgJn0
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-