General

  • Target

    gday.exe

  • Size

    3.7MB

  • Sample

    240409-ae9kyabc9t

  • MD5

    6df865d7f88035915d35abaea5b3bfbe

  • SHA1

    975aabf2b3461e7a5a913c29469120d3fd71f002

  • SHA256

    8709166e934abf9589b31cc6ff9d220579ca3134b20edbe0637b825ffa88d118

  • SHA512

    4e7d733d5e5c5bce0a20fb252595e0c44d005e7259cd7f0a6250bc11ba24401bd9bcc4ca0257314bb77f2de8406ef3454b6c8295af86eed8f44d3cdbb67a298a

  • SSDEEP

    98304:CctqfRCWSRQvkbBKXwXxS0ykO85DJtZRHp:rqXYCkVKgXxSdkO8r

Malware Config

Targets

    • Target

      gday.exe

    • Size

      3.7MB

    • MD5

      6df865d7f88035915d35abaea5b3bfbe

    • SHA1

      975aabf2b3461e7a5a913c29469120d3fd71f002

    • SHA256

      8709166e934abf9589b31cc6ff9d220579ca3134b20edbe0637b825ffa88d118

    • SHA512

      4e7d733d5e5c5bce0a20fb252595e0c44d005e7259cd7f0a6250bc11ba24401bd9bcc4ca0257314bb77f2de8406ef3454b6c8295af86eed8f44d3cdbb67a298a

    • SSDEEP

      98304:CctqfRCWSRQvkbBKXwXxS0ykO85DJtZRHp:rqXYCkVKgXxSdkO8r

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks