General

  • Target

    Nemesis.exe

  • Size

    39.0MB

  • Sample

    240423-xr4xjsba2s

  • MD5

    edbdcaa7270ae155bf4dc7ec410938af

  • SHA1

    308fec719b7ecbfbc489dce4796e874c5ab103cf

  • SHA256

    81b67fb81bba850ee785ddb031395df02167234cc0b364ba151d1785ea708315

  • SHA512

    7fe5a5977684c228b1fb033d213285997d40678891e1c32305e41544028df608cddcfad01ac9f634943c283608fd865a20a1d6c5bb527e3dea2677ed4ebf785c

  • SSDEEP

    786432:fkNi7s0TMQduy6jV+UYc0hupUGK3nW7/0ho16ZrBHv3x:sKs21P6x+UY5kszZr13x

Malware Config

Targets

    • Target

      Nemesis.exe

    • Size

      39.0MB

    • MD5

      edbdcaa7270ae155bf4dc7ec410938af

    • SHA1

      308fec719b7ecbfbc489dce4796e874c5ab103cf

    • SHA256

      81b67fb81bba850ee785ddb031395df02167234cc0b364ba151d1785ea708315

    • SHA512

      7fe5a5977684c228b1fb033d213285997d40678891e1c32305e41544028df608cddcfad01ac9f634943c283608fd865a20a1d6c5bb527e3dea2677ed4ebf785c

    • SSDEEP

      786432:fkNi7s0TMQduy6jV+UYc0hupUGK3nW7/0ho16ZrBHv3x:sKs21P6x+UY5kszZr13x

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks