General
-
Target
b7a282cd621172c5a76dacd370b6a02a
-
Size
127KB
-
Sample
240306-rv2cyabe5x
-
MD5
b7a282cd621172c5a76dacd370b6a02a
-
SHA1
6dc9c9abcb2c9c4cc6d67a4442142cec818cf5d4
-
SHA256
4245dd33e17400e1f5307c3f9f7dcab013638e392e310116923fc0e0bd6f51c4
-
SHA512
783a6111e616a488ea0bbdd20904036844748efee497b9730201eaf1d81beb0e544ac9f0335de338c507df7e4e5a7d3b7856ea9c2be46b8ff2efb3b58db9f3f3
-
SSDEEP
3072:EvgEL7Yo4PkH9sIb8WlJc2rftwh8lupNcnSXWje7sI+a7y6:EvgEPYo4Pktlq2rbluTcn4WRaW6
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-PHOTO.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
GOLAYA-PHOTO.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
GOLAYA-PHOTO.exe
-
Size
238KB
-
MD5
43fe764bb0d948ccae24fcbd8ac7c17e
-
SHA1
5f787deaec858095f6894f892b71b7e03a05d106
-
SHA256
f5c517c991353a148cea7f08bdb6e9eb34abc7e2fe98e25ae99dbd9f9a951aff
-
SHA512
e985b9f2bc813d66f2cd2a3b5e31a5dbf9e23f8046719e39657acd8b50554f6de2dce104d78ca5436a007c157bb4cc60d0c6355df9748271be5cfddfc2178b0d
-
SSDEEP
3072:jBAp5XhKpN4eOyVTGfhEClj8jTk+0hsquxV/hvdG+Cgw5CKHm:ObXE9OiTGfhEClq9XqK/hvxJJUm
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-