General
-
Target
5a6d19c2a0613a3ebf4363283fc035b3
-
Size
99KB
-
Sample
240114-gcqtdadhg6
-
MD5
5a6d19c2a0613a3ebf4363283fc035b3
-
SHA1
1679385674732b227b637c4f8b0f95acd78ca5d3
-
SHA256
c3bd4be4601e6800674e19da008d39eec892c6c7d6af6523e3568da24621f8cb
-
SHA512
dd287b82e857309d2636fe0442a4f6f25fcc676e8d11eaf7f1cb3783e078ac5b7dfecced65af5cc685cf3b77fe075993388d9df7b40a0a7c38ea6d5489547046
-
SSDEEP
3072:u47excGxFLPkH9SnbZDaFqLxRntGr+2tItZYpz4PIsC:u+eGYtPk0Z+eaHyE54PIR
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-PHOTO.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
GOLAYA-PHOTO.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
GOLAYA-PHOTO.exe
-
Size
149KB
-
MD5
0196884e4ae0fc48c9bf5f8260502466
-
SHA1
40a78aeb8bcd7abd24088e1103ac3b292c30992a
-
SHA256
20621acdaf45c4cbcdeb972a78a8baca5cb0327489da84523c406a1e740ec7ab
-
SHA512
cb9a56c4c3415c955befeaedcf83e92fbe768e1bcef07d280f0c5a3f047bbc6f9dc58532c4562088ee44bd8ec69acba371e22f42b92319517bd4d1cb6a66a55f
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hiHZYpz4PIsa:AbXE9OiTGfhEClq9k54PId
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-