General

  • Target

    RIDDHH0J.EXE.exe

  • Size

    36KB

  • Sample

    230720-m8jmtsgf5z

  • MD5

    d6a2fe42c4b65a84325aa486d87b698e

  • SHA1

    030dd854073de331986143bdd908afa6c00a3766

  • SHA256

    c24ab1c89e1f391f8c0393bd26701946a6636dff772df867aff644159764e278

  • SHA512

    d42b05f4e8b7d90e360620b8253ad37b5cf138d5f1b45e36fa65afe1548f4357ae50de41a21da7edaf62cb583f99d024dadb823772129110f6b03ff9bc0f711a

  • SSDEEP

    768:fJUUE5Zuq5Tllmu24Ra2DovIieNhIPVQPa9EB8B1:eUE5fTll92m7ov0oW6E81

Score
9/10

Malware Config

Targets

    • Target

      RIDDHH0J.EXE.exe

    • Size

      36KB

    • MD5

      d6a2fe42c4b65a84325aa486d87b698e

    • SHA1

      030dd854073de331986143bdd908afa6c00a3766

    • SHA256

      c24ab1c89e1f391f8c0393bd26701946a6636dff772df867aff644159764e278

    • SHA512

      d42b05f4e8b7d90e360620b8253ad37b5cf138d5f1b45e36fa65afe1548f4357ae50de41a21da7edaf62cb583f99d024dadb823772129110f6b03ff9bc0f711a

    • SSDEEP

      768:fJUUE5Zuq5Tllmu24Ra2DovIieNhIPVQPa9EB8B1:eUE5fTll92m7ov0oW6E81

    Score
    9/10
    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v6

Tasks