General
-
Target
54fb8660b413047c61fc5e532f87c81a_JaffaCakes118
-
Size
91KB
-
Sample
241018-cycres1fre
-
MD5
54fb8660b413047c61fc5e532f87c81a
-
SHA1
fc9b2cce0ab714955e5defee1e4f68b5dee52c25
-
SHA256
a4b45b4cffc31b4fa1a3b4896e606fd7cac49a047e8e97389363a920826cac31
-
SHA512
24d67d7582ce3b19c5557535495bccfb117e1b4e06869055f8f843c60e4c987d579a7a5ac8d4118b702ea9ff66dca0724cffc7bf5aefc22405e3d604668818ff
-
SSDEEP
1536:xQwHfvMS0xcGxFyhQkrnb1Mq9WbJOnMA+txGFCr6cXp4xkPdh2B3Se7yN5y:xnHXMpxcGxFyhQ0bOqYuc6c7P6F
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-SEXY.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
GOLAYA-SEXY.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
GOLAYA-SEXY.exe
-
Size
180KB
-
MD5
63f222fa3dec54c99fa71bfbef798cab
-
SHA1
a6aa7dca45be30f5f1f0a2c0cf24c15637fe33f4
-
SHA256
47bfc569cb27c9596d81d144a9af37d5f378dcdaf73d6c416b86362739354b8f
-
SHA512
75c8086cd6dce1433e426f8f65d893130847b0ded224a4c6f26ebc6ee1ef9a33299da4f8902067697717b3cd8e4a855018929fb8d562c9581e79d023ae46e2df
-
SSDEEP
3072:eBAp5XhKpN4eOyVTGfhEClj8jTk+0h+tzYOuIPA:1bXE9OiTGfhEClq9dYpII
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-