General
-
Target
gday.exe
-
Size
3.7MB
-
Sample
240409-ae9kyabc9t
-
MD5
6df865d7f88035915d35abaea5b3bfbe
-
SHA1
975aabf2b3461e7a5a913c29469120d3fd71f002
-
SHA256
8709166e934abf9589b31cc6ff9d220579ca3134b20edbe0637b825ffa88d118
-
SHA512
4e7d733d5e5c5bce0a20fb252595e0c44d005e7259cd7f0a6250bc11ba24401bd9bcc4ca0257314bb77f2de8406ef3454b6c8295af86eed8f44d3cdbb67a298a
-
SSDEEP
98304:CctqfRCWSRQvkbBKXwXxS0ykO85DJtZRHp:rqXYCkVKgXxSdkO8r
Behavioral task
behavioral1
Sample
gday.exe
Resource
win11-20240221-en
Malware Config
Targets
-
-
Target
gday.exe
-
Size
3.7MB
-
MD5
6df865d7f88035915d35abaea5b3bfbe
-
SHA1
975aabf2b3461e7a5a913c29469120d3fd71f002
-
SHA256
8709166e934abf9589b31cc6ff9d220579ca3134b20edbe0637b825ffa88d118
-
SHA512
4e7d733d5e5c5bce0a20fb252595e0c44d005e7259cd7f0a6250bc11ba24401bd9bcc4ca0257314bb77f2de8406ef3454b6c8295af86eed8f44d3cdbb67a298a
-
SSDEEP
98304:CctqfRCWSRQvkbBKXwXxS0ykO85DJtZRHp:rqXYCkVKgXxSdkO8r
Score9/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Sets service image path in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-