General
-
Target
8c3f078027515e67f0e796d4f06e2020
-
Size
129KB
-
Sample
240203-nxd4msaffn
-
MD5
8c3f078027515e67f0e796d4f06e2020
-
SHA1
e313b0897fe0e96aac4bcd4ae9cf18b3860a2d35
-
SHA256
67387e7d1c4c20a00e51771989cc23f296bfb6f894b5acde4f7514b1d9bd933d
-
SHA512
fdbb626603f23e7f792f7e14537273d5e4183f272dbd98b0ca4bfe99fdd57f61d1c310ed12e5dc6702f88804eb2f08392e0d586c063211e17759d7f29ec8d348
-
SSDEEP
3072:q3FBmZAE9zLEDal8aeytZe0xweAfAfBjnPHEYBd+QAAIYN+:qVsZ59zLE+l8a1meaqBjnPHfKQAAI8+
Static task
static1
Behavioral task
behavioral1
Sample
PHOTO-GOLAYA.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
PHOTO-GOLAYA.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
PHOTO-GOLAYA.exe
-
Size
239KB
-
MD5
70145b98f3b3890a6f5989107b1cfef2
-
SHA1
616bd2cebdf266d468807ff2429546f28485249b
-
SHA256
9d3589d93ecdce7415f84ea14ab5df139fd3af4189833c3f45725885e344f3d3
-
SHA512
234249c5c67621693395629afb64e659139518ca1c45b5280c717a7c3dd3bf9fa0c8f4e67972c7a125a9aa9e08955d93b82da06a72e415aedd676111f4bed0de
-
SSDEEP
6144:CbXE9OiTGfhEClq9cpRM1qcVVx/ZsLJJUq:qU9Xiui++7
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-