General

  • Target

    nemesis.exe

  • Size

    145KB

  • Sample

    230401-2tpmvsef6y

  • MD5

    50308cb5da61006033d96dcb7215d26c

  • SHA1

    0a3664214ecec693a85b73750b967c96d52ebdd6

  • SHA256

    502963ee9e86da5e50bd09f3fcb7adadf67862bbe9757ec459bce700dd6fe97f

  • SHA512

    34adb027921d43a67900a2d30957ca5531ecd4ff0d6acea4c35fac023b67fc4e035eadce07c63842849cc95af4eee345026e080f758d97c65e5edae3005496af

  • SSDEEP

    3072:1PAydW8hHlyIevVhITNW/y6r3WKrQqErj0kY/l+O+d9Sok6fSQz:JASl8toW33zrqEH/YOwSor6Q

Malware Config

Targets

    • Target

      nemesis.exe

    • Size

      145KB

    • MD5

      50308cb5da61006033d96dcb7215d26c

    • SHA1

      0a3664214ecec693a85b73750b967c96d52ebdd6

    • SHA256

      502963ee9e86da5e50bd09f3fcb7adadf67862bbe9757ec459bce700dd6fe97f

    • SHA512

      34adb027921d43a67900a2d30957ca5531ecd4ff0d6acea4c35fac023b67fc4e035eadce07c63842849cc95af4eee345026e080f758d97c65e5edae3005496af

    • SSDEEP

      3072:1PAydW8hHlyIevVhITNW/y6r3WKrQqErj0kY/l+O+d9Sok6fSQz:JASl8toW33zrqEH/YOwSor6Q

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Stops running service(s)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Impair Defenses

1
T1562

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Impact

Service Stop

1
T1489

Tasks