General
-
Target
de40a20364c01801d37d2bb49e966c2e
-
Size
99KB
-
Sample
240325-r1lvfaah74
-
MD5
de40a20364c01801d37d2bb49e966c2e
-
SHA1
ca0166bb16ae771183aed300c175b2af202ed3dc
-
SHA256
c4a522e2bafac19fe7b89dff72a6e87bc47fe8202c185273083717b105d206f9
-
SHA512
283944fe8a5c763263eb3fe07afb7ddc702ebf9fb85e7ca6a3eff58a47e5ac2c1dc6c7b7df232f2c5142eee905dc7e344ef1661dbb57d54be1846a6c66c84c07
-
SSDEEP
3072:Z47excGxFLPkH9SnbZDazo21mLtQqVI+8iX2:Z+eGYtPk0Z+zo6JDiX2
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-PHOTO.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
GOLAYA-PHOTO.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
GOLAYA-PHOTO.exe
-
Size
149KB
-
MD5
e1fb70408c7945c6524c321063bd9570
-
SHA1
ebcd6a63fac9609c46e9c84708aa1e5701ee7775
-
SHA256
3e2da7a655e400f9e6ad442d4db21bac0a9528bc825aaaa8fdd97406458a59ed
-
SHA512
58751bd094dfc28c8b83085a480f70d1dfc97b990e69d90c4abe6ad5ec68c2a215445a664d5287bc624eab4175c2479fe6f0802b045fea61c12449af05f34814
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0higWrUzM/XP:AbXE9OiTGfhEClq9GWruyXP
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-