General
-
Target
504a474d47c98d02033db23f662439d5
-
Size
99KB
-
Sample
240110-ma536sdeaq
-
MD5
504a474d47c98d02033db23f662439d5
-
SHA1
3aef4547cdcac87b38303239e0b71706997cd482
-
SHA256
bd9280ba3f109483d01376e827433d0f8e54c87ddcd474807f66f737736783c7
-
SHA512
96fff00cfe7281a71d6f54f4b5ece8fa4f1e02efa2764a48b58fd837ee4fde96563d94127e24c3351271c3edbb35bb633233c44c2256fa35cc35bcacd2c6de35
-
SSDEEP
3072:o47excGxFLPkH9SnbZDa6mRvNe3L9XPFgoDgTpLnNX:o+eGYtPk0Z+jsL1PFgoDgJn1
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-PHOTO.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
GOLAYA-PHOTO.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
GOLAYA-PHOTO.exe
-
Size
149KB
-
MD5
ccca394b1369e766c53346550b481c57
-
SHA1
47dccd3fc9b7bf7c98f75fa11725089d5a977b4c
-
SHA256
211901e1229d7b816754146ff8d7167e8a92211afe63dc44eb8056d0b054a12a
-
SHA512
98625c9dd7cc8b57609ce20f6f295dc8704a75b49cde806ddbbb040cf3832028425bed0cd0da0c501508fabd2cdc59cd1717fa948362281848ed4ba798990712
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hisUwxgTpLnNq:AbXE9OiTGfhEClq9TwxgJn0
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-