General
-
Target
88f1c3dd53980a1164ae1a6075d328b2
-
Size
99KB
-
Sample
240202-jhaqfsbbdj
-
MD5
88f1c3dd53980a1164ae1a6075d328b2
-
SHA1
445fc437f1ef14bb0d5dbb526142bd9335c20b20
-
SHA256
100eda43266896f9b395befce560a51c09b576844d4e51b87ed3eea326d7c170
-
SHA512
e9139bd393c973031be11a983a79feda40785bf23659f0adbefc3d6f6207d1193c3c1cecd29e6c0bddab694f6c4dcffd4b744a86490a786e28023a20939646b7
-
SSDEEP
3072:847excGxFLPkH9SnbZDazo21mLtQqVI+8iXf:8+eGYtPk0Z+zo6JDiXf
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-TOPLESS.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
GOLAYA-TOPLESS.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
GOLAYA-TOPLESS.exe
-
Size
149KB
-
MD5
e1fb70408c7945c6524c321063bd9570
-
SHA1
ebcd6a63fac9609c46e9c84708aa1e5701ee7775
-
SHA256
3e2da7a655e400f9e6ad442d4db21bac0a9528bc825aaaa8fdd97406458a59ed
-
SHA512
58751bd094dfc28c8b83085a480f70d1dfc97b990e69d90c4abe6ad5ec68c2a215445a664d5287bc624eab4175c2479fe6f0802b045fea61c12449af05f34814
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0higWrUzM/XP:AbXE9OiTGfhEClq9GWruyXP
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-