General
-
Target
JaffaCakes118_40c110ffb076b01aacef8f1191a3a0b7
-
Size
110KB
-
Sample
250127-scprvsvkdn
-
MD5
40c110ffb076b01aacef8f1191a3a0b7
-
SHA1
9df580a94c6b7c9012ec2e701d0a71f355a0e0ae
-
SHA256
5ced6621ea25bb55548d0a8942413c51351deeb66287fc199829c8419712c845
-
SHA512
1dc135248f2abe9a70f12cd30fb4a014ec049b0353ac916caf1068f2a525f51584902aed78687a8d9ca294346864a655405cad61b075b651004bf98788dda45a
-
SSDEEP
3072:Trz/BRgd7NTpAb+ratuADH3YckoIrDgEmk:TP/BRgV33atjTkogDZ
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-SEXY.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
GOLAYA-SEXY.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
GOLAYA-SEXY.exe
-
Size
238KB
-
MD5
1414a0cf3ae3455f7445753aa9ef0ac9
-
SHA1
c6e63022a267155926638e028ba0bfafe614ff15
-
SHA256
2acd2fd6a3fbb4fe40a62ba571ed6015fdbec4a0a6aec9ccde3f33cbc803fee7
-
SHA512
939e9f2dca756893d04a1619537ee7e71c7eda27ebf9785b16fe0e892327ba23d2bbc54d82b97e590d803ce01d89087eaf24b330572aa5ba14c0668d9faf29b0
-
SSDEEP
6144:zbXE9OiTGfhEClq9rZXpdKw/F4qweYG3/jk8hqfFyBgRY7JJUm:/U9XiuiI
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-