General
-
Target
fab3a52732f6e5e92692d77f85b7c3b5_JaffaCakes118
-
Size
91KB
-
Sample
240419-tywb7shb43
-
MD5
fab3a52732f6e5e92692d77f85b7c3b5
-
SHA1
9daf41f328ed549b625c68798471f22d521a1f81
-
SHA256
2eb8f7e9c8d2a8452343ee39fccdb8774de780b45bbb633bc41c14f5284516a6
-
SHA512
70258cc30cbd1eb42659cb01040761d37e4ac4132967930ba7b71ab5dc088923e7c0dac47f11de35ad5ba2eac300407539d0a25b5470ddc10c6fe812c4324132
-
SSDEEP
1536:GQwHfvMS0xcGxFyhQkrnb1Mq9WbJOnMA+txGFCr6cXp4xkPdh2B3Seyk:GnHXMpxcGxFyhQ0bOqYuc6c7P6ck
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-SEXY.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
GOLAYA-SEXY.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
GOLAYA-SEXY.exe
-
Size
180KB
-
MD5
b5a44c060c6c4a2d439f9906574a0073
-
SHA1
89db03d3f47080cca01ebc298f8c989a6b13d3ff
-
SHA256
d1e011fc69e871b93db9de9f90422097fd88f220ecf664be1d718d2d25fc1c33
-
SHA512
26b09dc50fe71874c3a96c9434d82681a7ceb588869a5a6e070f5d77daea912d82350745ffd1ecc2fb59c56598fcd15289598cdfca3ddbd6ea416eaf8bb6ae88
-
SSDEEP
3072:eBAp5XhKpN4eOyVTGfhEClj8jTk+0h+tzYOuI0m7:1bXE9OiTGfhEClq9dYpI0M
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-