General

  • Target

    54dc2dc0ae82974883da14cececb8aef

  • Size

    79KB

  • Sample

    240111-3a44waadbp

  • MD5

    54dc2dc0ae82974883da14cececb8aef

  • SHA1

    9560555dc1beb64a60234ccd3b1b7d746dd60cf8

  • SHA256

    059fecdb8f1c3c9a6831be49efdd45cf852b4852bca4452fd6d1d8c8113e3b90

  • SHA512

    d78207cc6bdfe5516a172fdf7b7a2cb0257440bb4b9b4dbc4bec2fef9c2457ffa79f7752c6b4c28bebe3b6f0b0c4167128a27bf245eaa6743b68c61dbd24324e

  • SSDEEP

    1536:8vg1WKQmK74VzprUxe7kvLSPkIJNE9sq0Qs07t+vhAUqHRKKXPTKFnmq/MH5YEAx:8vgEL7Yo4PkH9sIbMpAxQKXP+Fr/MHN+

Score
8/10

Malware Config

Targets

    • Target

      GOLAYA-SEXY.exe

    • Size

      180KB

    • MD5

      05dcabe4947ada380eb48cf90eb0aa6f

    • SHA1

      d11c9319a518ddc14dc62cc138d074b1d908c924

    • SHA256

      53b296ba46752bf57d298dfe5ba8b011574253199e57ffd8c8786bb16f642f49

    • SHA512

      a336ca962fe97f329fa6968e2532096a0051e5f124c20c7ba74d6688e5b15b2f34980b56f2b6f1e5ff3a53a05936510f22841279497ca50061e5c3fc55ea1614

    • SSDEEP

      3072:nBAp5XhKpN4eOyVTGfhEClj8jTk+0hJiH8ga2EPb9ePlO7/IQ1bvatjKv5sK2DdH:qbXE9OiTGfhEClq9j8ga2+b9ePlO7/IR

    Score
    8/10
    • Blocklisted process makes network request

    • Drops file in Drivers directory

MITRE ATT&CK Enterprise v15

Tasks