General
-
Target
c2001c913f1c9ff2d3b623a1853578c5
-
Size
99KB
-
Sample
240312-avn9yach49
-
MD5
c2001c913f1c9ff2d3b623a1853578c5
-
SHA1
bfa354d0ba73c72d6fb3490728593d84df05c2ea
-
SHA256
4b13db41b4d7731289a414cbe9a33d5304fd9c6a85c1fec6edb6a92817275e79
-
SHA512
a42b14fc82255911462315dd1b10ed1e97587ed65bb933fd7450d752f0af6900a2ab4b294a376ca41e84c5b5ba947c8aac812f21ec0d7d04112f13daeb8a4eac
-
SSDEEP
3072:y47excGxFLPkH9SnbZDazo21mLtQqVI+8iXR:y+eGYtPk0Z+zo6JDiXR
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-TOPLESS.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
GOLAYA-TOPLESS.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
GOLAYA-TOPLESS.exe
-
Size
149KB
-
MD5
e1fb70408c7945c6524c321063bd9570
-
SHA1
ebcd6a63fac9609c46e9c84708aa1e5701ee7775
-
SHA256
3e2da7a655e400f9e6ad442d4db21bac0a9528bc825aaaa8fdd97406458a59ed
-
SHA512
58751bd094dfc28c8b83085a480f70d1dfc97b990e69d90c4abe6ad5ec68c2a215445a664d5287bc624eab4175c2479fe6f0802b045fea61c12449af05f34814
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0higWrUzM/XP:AbXE9OiTGfhEClq9GWruyXP
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-