General

  • Target

    bid.exe

  • Size

    65KB

  • Sample

    240213-yblayahf78

  • MD5

    dfc805fdc139f70a33e00bcd28d66bc9

  • SHA1

    e7eaaaa5e16b4166c7bb552e6c753ef1c38e6287

  • SHA256

    e6c457b01c6f86ed263b658e2a943150e5db2c0e60a049ab8853be4c27664a76

  • SHA512

    2b90f1f729f036821fefcbbe28bb04be5028c844bc1c90c10c3c14da80f3fcbca96a50c9e2a2ea5303ebc769a5eb522f5542273fbb7258ab030bbadb412d1178

  • SSDEEP

    1536:iyMQ47BUaCjKMbyf6b/PjIDD1oZ1iMPswVcl:i52jKxf6b/PjIv1zMPsqY

Score
9/10

Malware Config

Targets

    • Target

      bid.exe

    • Size

      65KB

    • MD5

      dfc805fdc139f70a33e00bcd28d66bc9

    • SHA1

      e7eaaaa5e16b4166c7bb552e6c753ef1c38e6287

    • SHA256

      e6c457b01c6f86ed263b658e2a943150e5db2c0e60a049ab8853be4c27664a76

    • SHA512

      2b90f1f729f036821fefcbbe28bb04be5028c844bc1c90c10c3c14da80f3fcbca96a50c9e2a2ea5303ebc769a5eb522f5542273fbb7258ab030bbadb412d1178

    • SSDEEP

      1536:iyMQ47BUaCjKMbyf6b/PjIDD1oZ1iMPswVcl:i52jKxf6b/PjIv1zMPsqY

    Score
    9/10
    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks