General
-
Target
Nyx.exe
-
Size
3.5MB
-
Sample
240630-t9b3ps1blb
-
MD5
00ec60cd1add4a2f61e48c7b0a6c810f
-
SHA1
174af7f09725d67d522e65066d3e3662da50a4e2
-
SHA256
df4da6874570d3e753519898684bbad60378725d24f9557f5d5294fcfd795a29
-
SHA512
244afaa72bea7b46633dbaf79bdac388dfaf190e88d3a7675d16b36cfaeb39e9b47f1dc6ac1ddc059c64e091dfff562460ac83f9e669e42c3f90ac9fc44c1003
-
SSDEEP
98304:zcwncs4fUCBRTna03MfhwbIZosECIMRvl:Ywnc3HdahZ4IgCr
Behavioral task
behavioral1
Sample
Nyx.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
Nyx.exe
-
Size
3.5MB
-
MD5
00ec60cd1add4a2f61e48c7b0a6c810f
-
SHA1
174af7f09725d67d522e65066d3e3662da50a4e2
-
SHA256
df4da6874570d3e753519898684bbad60378725d24f9557f5d5294fcfd795a29
-
SHA512
244afaa72bea7b46633dbaf79bdac388dfaf190e88d3a7675d16b36cfaeb39e9b47f1dc6ac1ddc059c64e091dfff562460ac83f9e669e42c3f90ac9fc44c1003
-
SSDEEP
98304:zcwncs4fUCBRTna03MfhwbIZosECIMRvl:Ywnc3HdahZ4IgCr
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-