General
-
Target
e28774bafac052f06ea39fadbfb10b91_JaffaCakes118
-
Size
131KB
-
Sample
240406-phmb5sag26
-
MD5
e28774bafac052f06ea39fadbfb10b91
-
SHA1
1ceefff39aefb311c63d1dc1f56153139a4e9125
-
SHA256
76bda33e791ecf529a2578d8f6d0e6736ffccc6a26e2d0ba53497caa7514b886
-
SHA512
4cf84d0ffb8c8dd37beaddb9793009a6244c8816cad64b3bf6bab0b624530b1e3bbc590750850673a6324ab61a27509819b3c1a7930aca2bd3efc730d4259125
-
SSDEEP
3072:mnHXMpxcGxFyhQ0bOqYW6Qn6RuhCmICaylBxEK6TO6v:CHmGY/o0W6Q6R8CsaKBT6C6v
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-SEXY.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
GOLAYA-SEXY.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
GOLAYA-SEXY.exe
-
Size
238KB
-
MD5
356b69500eca08b5e00fce6e11922f63
-
SHA1
4132beec4d338f4cbcc06c3b0f4d6ed4337c62dc
-
SHA256
08589e58ed2af1994ca1c816768e5f2a042b0ec7186d2c673a4b5f754f5453f0
-
SHA512
f34ba040b04feaed119281bf592e57d6bd00bed0f19ed2fc5644ce286321af0127fcebb1233c4c7d5f20f0f85d0be73b6a60164aa5ab515a7b3332af7100018d
-
SSDEEP
6144:MbXE9OiTGfhEClq9528TfdRoWRg+lNEAJJUm:oU9XiuiJ8DRxl3
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-