General
-
Target
d7a8b48c52d282b1cf8c91264d1d7464
-
Size
99KB
-
Sample
240320-czmb9afc9x
-
MD5
d7a8b48c52d282b1cf8c91264d1d7464
-
SHA1
6f21bab6a11b869adb524e68a0744a069a033bdc
-
SHA256
02b8478e00ac16c06a36eac7f0b1950f4a6c3594400181f80b2e93911374bc0a
-
SHA512
0d5a94b2610bda1518b3e9fef5f5bad082f2320aa031903128789febe19465bc3f41cd6bbcc97f67d49f018ab5d6e59c3f7bef78091eae04d8fc4ac5954c476a
-
SSDEEP
3072:K47excGxFLPkH9SnbZDaFwQtzmhkrUyZ31dLiikrXc:K+eGYtPk0Z+FwMzikrlZXWg
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-TOPLESS.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
GOLAYA-TOPLESS.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
GOLAYA-TOPLESS.exe
-
Size
149KB
-
MD5
bb56c5bb89c3b94f370473b957aece84
-
SHA1
4139ddb92122333d61e57c97cbd75a91bd8a42ed
-
SHA256
b3928bb091873840a406cb0f0c3f5f35fb8c04d729b407672c498f6a78e74f8c
-
SHA512
ff6a55323b554e88d96d3ac29c9e0187f295af7c7065a2bf20b5fe494bdb3068f422142631bc39b24e4174957095e99afffa162065740934f17d94c6cab1a374
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hiztfVOO0krXu:AbXE9OiTGfhEClq9pf76
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-