General
-
Target
7084b08643f15620b276371007257c3e
-
Size
99KB
-
Sample
240123-zhtfkahdel
-
MD5
7084b08643f15620b276371007257c3e
-
SHA1
ed2323874b5f1dc477b65809e1646b849ea9e79b
-
SHA256
96cb5fabd8c66c6779ab879c95c6dc6b20464bfb063706dbf90844762b145ae0
-
SHA512
d035313969a5f7fe1d377f187f0c698043acebea7390c9981228b8668add79f96e9c948a410b8580065a9013cc099158ab34d57ba52417e0d638f64c06c1c7cc
-
SSDEEP
3072:847excGxFLPkH9SnbZDaFqLxRntGr+2tItZYpz4PIsD:8+eGYtPk0Z+eaHyE54PIG
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-SEXY.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
GOLAYA-SEXY.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
GOLAYA-SEXY.exe
-
Size
149KB
-
MD5
0196884e4ae0fc48c9bf5f8260502466
-
SHA1
40a78aeb8bcd7abd24088e1103ac3b292c30992a
-
SHA256
20621acdaf45c4cbcdeb972a78a8baca5cb0327489da84523c406a1e740ec7ab
-
SHA512
cb9a56c4c3415c955befeaedcf83e92fbe768e1bcef07d280f0c5a3f047bbc6f9dc58532c4562088ee44bd8ec69acba371e22f42b92319517bd4d1cb6a66a55f
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hiHZYpz4PIsa:AbXE9OiTGfhEClq9k54PId
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-