General
-
Target
ac617ac549205ea300dcfc0eee5978b1
-
Size
78KB
-
Sample
240228-vd7eeaha28
-
MD5
ac617ac549205ea300dcfc0eee5978b1
-
SHA1
3995d08d2151018e629d7c62107aaf0974384b74
-
SHA256
2df8878b97e7320accec7f7458b5727355fc171fe932e91eb393a96388fa1522
-
SHA512
d229cc5f982cbe76fb6b2d6fa61813546fbbb04ced0731ef5a1973ec0b90125f676f97f51043447ceb19c905b3fccba031b1dcfdfd20e261b46281b363c8c293
-
SSDEEP
1536:0QwfwimgTY23tG90wIsWfHlWKSd+QSqWU5FMQCoFuJlmSKV/I0JZXdLxoSg5Kgmy:0noimg13tG90HdQ3Sqt2oFUU5/IOBdLS
Static task
static1
Behavioral task
behavioral1
Sample
PHOTO-GOLAYA.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
PHOTO-GOLAYA.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
PHOTO-GOLAYA.exe
-
Size
180KB
-
MD5
55e47874ef9912a4309c4c90af7b67f8
-
SHA1
bda07533ed744d3c78ee34ab416d883504212e3e
-
SHA256
c3199ed5f9a3d4e51e4ff8287875a04a91602e348dcef11c403e90d96eea59f7
-
SHA512
d01550350e18c0507e8f45e1a970cfd6bfa910c2a334fe65ffc26f7347e9b967906a950bd6918fa2c19aebfdf087f2f82bf3a47e96af1ef903697d3672edad36
-
SSDEEP
3072:TBAp5XhKpN4eOyVTGfhEClj8jTk+0h6ejmo:+bXE9OiTGfhEClq9dejD
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-