Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-SEXY.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
GOLAYA-SEXY.exe
Resource
win10v2004-20241007-en
General
-
Target
3c56a383ffb7f84546279a79a9806759_JaffaCakes118
-
Size
99KB
-
MD5
3c56a383ffb7f84546279a79a9806759
-
SHA1
ab0d38b8049c6948270adffff5e30f1e2f280a17
-
SHA256
1336fc924a8f205bbc839a92e7e47e85fb9d0e0e6c0bcc22bd433c0f9bb5622f
-
SHA512
19ee2d782171069954cd09f022c0d3f12086f1dfc1ff4951e212b87ee401133e9a7bcd20b2efdb4824c67ab084b11b2a468533a2c72d3db64b714651f1ade6ee
-
SSDEEP
3072:e47excGxFLPkH9SnbZDaWoN093t1pPXWHD:e+eGYtPk0Z+b29FPWHD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/GOLAYA-SEXY.exe
Files
-
3c56a383ffb7f84546279a79a9806759_JaffaCakes118.zip
-
GOLAYA-SEXY.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 91KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 2KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ