General

  • Target

    X07.exe

  • Size

    44.6MB

  • Sample

    240727-b9a7asyhrp

  • MD5

    3c9e2d2138a990aed5361f44cf60cdad

  • SHA1

    fb22fee3c0432464f692d71c8cf0f26fc524a2b8

  • SHA256

    c9702b31b7b477edfa4ebba4453290117bc36ef406429dc3f5aedd08a125e53d

  • SHA512

    27b25113e05a79644219e603cbc191cfa98a690ff73e6a1bb545d03d1d3544f2ac51cade4d32a697147bf48d3ddccbdc9e6e61487f562a6e68cde0c54dc4fdb5

  • SSDEEP

    786432:37aCw84eTTO787R02hRXKVbGifrygSf8zyIMf3yQHWsWNNzhZDgt:37jw844W2hRXqG0ry4zMfCQ2jZD

Malware Config

Targets

    • Target

      X07.exe

    • Size

      44.6MB

    • MD5

      3c9e2d2138a990aed5361f44cf60cdad

    • SHA1

      fb22fee3c0432464f692d71c8cf0f26fc524a2b8

    • SHA256

      c9702b31b7b477edfa4ebba4453290117bc36ef406429dc3f5aedd08a125e53d

    • SHA512

      27b25113e05a79644219e603cbc191cfa98a690ff73e6a1bb545d03d1d3544f2ac51cade4d32a697147bf48d3ddccbdc9e6e61487f562a6e68cde0c54dc4fdb5

    • SSDEEP

      786432:37aCw84eTTO787R02hRXKVbGifrygSf8zyIMf3yQHWsWNNzhZDgt:37jw844W2hRXqG0ry4zMfCQ2jZD

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks