General
-
Target
75c2da4d2c961c7d1b6edc0625ad373d
-
Size
78KB
-
Sample
240125-27fbcahcb6
-
MD5
75c2da4d2c961c7d1b6edc0625ad373d
-
SHA1
0a08d3e462e0e12e557c7562527097fab33de6f8
-
SHA256
883a2f893b88450c284599d306648db54275c25a8a53a25a081d0a04d0cf8601
-
SHA512
cd15d2893a9152f16477459655b4f77ce72a01fef448a8340501c4ae018c6e96a82397332d92eb47ca4e9301fa3edb5dd0509b515f098b3966976f62937ef7e3
-
SSDEEP
1536:5QwfwimgTY23tG90wIsWfHlWKSd+QSqWU5FJ2hZ+cYS4BHKFJtBf9ntlsp0O0:5noimg13tG90HdQ3Sqtlm+VSFJ/lntl5
Static task
static1
Behavioral task
behavioral1
Sample
PHOTO-GOLAYA.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
PHOTO-GOLAYA.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
PHOTO-GOLAYA.exe
-
Size
180KB
-
MD5
2e7d20079b41b69b3b16ecbd895be189
-
SHA1
c63b1f1a9ec96ca7b0fc0d92bc082593e1df85e0
-
SHA256
8aac418dfae104c626385ba620705f3d8f83ad9753020474a7fd41db3e808fc6
-
SHA512
ab1326e5b177a7d32f7d97c0d3efce235df0da4d2b2faf40528fe399e0adccb6e7c67c2aac07f15294be6c23f12b966c9fc3135d9b8f561e99f10a5ad98532e9
-
SSDEEP
3072:TBAp5XhKpN4eOyVTGfhEClj8jTk+0h6eXmUS:+bXE9OiTGfhEClq9deXY
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-