General
-
Target
Nemesis.exe
-
Size
39.0MB
-
Sample
240423-xr4xjsba2s
-
MD5
edbdcaa7270ae155bf4dc7ec410938af
-
SHA1
308fec719b7ecbfbc489dce4796e874c5ab103cf
-
SHA256
81b67fb81bba850ee785ddb031395df02167234cc0b364ba151d1785ea708315
-
SHA512
7fe5a5977684c228b1fb033d213285997d40678891e1c32305e41544028df608cddcfad01ac9f634943c283608fd865a20a1d6c5bb527e3dea2677ed4ebf785c
-
SSDEEP
786432:fkNi7s0TMQduy6jV+UYc0hupUGK3nW7/0ho16ZrBHv3x:sKs21P6x+UY5kszZr13x
Static task
static1
Behavioral task
behavioral1
Sample
Nemesis.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Nemesis.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
Nemesis.exe
-
Size
39.0MB
-
MD5
edbdcaa7270ae155bf4dc7ec410938af
-
SHA1
308fec719b7ecbfbc489dce4796e874c5ab103cf
-
SHA256
81b67fb81bba850ee785ddb031395df02167234cc0b364ba151d1785ea708315
-
SHA512
7fe5a5977684c228b1fb033d213285997d40678891e1c32305e41544028df608cddcfad01ac9f634943c283608fd865a20a1d6c5bb527e3dea2677ed4ebf785c
-
SSDEEP
786432:fkNi7s0TMQduy6jV+UYc0hupUGK3nW7/0ho16ZrBHv3x:sKs21P6x+UY5kszZr13x
Score9/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-