General
-
Target
493dc3ac36cb3cb0cc2fc9fdb4ed6dc2
-
Size
113KB
-
Sample
240107-ry3p6saca2
-
MD5
493dc3ac36cb3cb0cc2fc9fdb4ed6dc2
-
SHA1
64a328f0dba08a8aafb66421fbccf3d747a1ec23
-
SHA256
4789bc2b5d8584085cff6869f61f5b75a0d995df5d883b78e1933b716c495c2f
-
SHA512
c1fdd864759d9bfccd4d4f78bd47f861e3fc09aa6a727bfda2ace1fc7a6eb3b2a85c4a398bf59243fbb4b091c0d100e5df43c8d7b23e6ee6e7d7880c89c5d36a
-
SSDEEP
3072:znHXMpxcGxFyhQ0bOqYAmEnFyx9A+NbMekc7AwKcr5GVgxE:bHmGY/o0AhFyxzQekcl/r5GVmE
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-SEXY.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
GOLAYA-SEXY.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
GOLAYA-SEXY.exe
-
Size
239KB
-
MD5
f4eeb055f29a903de30886496d2399d0
-
SHA1
3f10e04a7b1884382759b252f294b6db527877c6
-
SHA256
802a092b98f19900cc472c08f9bc07009f16197d15f66273be6ae7fe77df0456
-
SHA512
d77d6fca5c1297816150b21c1c1f71080a273a2512dd657a2eff159070ff66c8fd9b7531c2f0230f489fec35a12646f9940fc3d3d4ba00b2a191a1c84454a567
-
SSDEEP
6144:sbXE9OiTGfhEClq9zrd52hTDOC661lYQawJJUq:IU9Xiuix1lYQaS
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-