General

  • Target

    Nyx.exe

  • Size

    3.5MB

  • Sample

    240630-t9b3ps1blb

  • MD5

    00ec60cd1add4a2f61e48c7b0a6c810f

  • SHA1

    174af7f09725d67d522e65066d3e3662da50a4e2

  • SHA256

    df4da6874570d3e753519898684bbad60378725d24f9557f5d5294fcfd795a29

  • SHA512

    244afaa72bea7b46633dbaf79bdac388dfaf190e88d3a7675d16b36cfaeb39e9b47f1dc6ac1ddc059c64e091dfff562460ac83f9e669e42c3f90ac9fc44c1003

  • SSDEEP

    98304:zcwncs4fUCBRTna03MfhwbIZosECIMRvl:Ywnc3HdahZ4IgCr

Malware Config

Targets

    • Target

      Nyx.exe

    • Size

      3.5MB

    • MD5

      00ec60cd1add4a2f61e48c7b0a6c810f

    • SHA1

      174af7f09725d67d522e65066d3e3662da50a4e2

    • SHA256

      df4da6874570d3e753519898684bbad60378725d24f9557f5d5294fcfd795a29

    • SHA512

      244afaa72bea7b46633dbaf79bdac388dfaf190e88d3a7675d16b36cfaeb39e9b47f1dc6ac1ddc059c64e091dfff562460ac83f9e669e42c3f90ac9fc44c1003

    • SSDEEP

      98304:zcwncs4fUCBRTna03MfhwbIZosECIMRvl:Ywnc3HdahZ4IgCr

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks