General
-
Target
nyxia.zip
-
Size
3.3MB
-
Sample
240613-sr3bhathpd
-
MD5
56f17b27ebc6745158c4c1bbe33e37cf
-
SHA1
f6a2895bff8c1ca297847d41eb47c93ea22587a5
-
SHA256
58d91d1cbe86643d2e638a2554e35479a88c289c7efb527abc4685ea7f281df5
-
SHA512
f49e991ab5ef5044e60deab39f47297675703163c0e6fc35860fef46252f3c5b6601757425f703caff0aa0319b00d664c378deabfdbce0f86f76d7ae6a38a7c8
-
SSDEEP
49152:dUo3c4JPoDLxCMEf51pgmQIVl65vdLT6ENytL8A3hGXoBC/gx/Ismly8hcMz6Kjq:ioVJwDLxCBLpa1PyQEG4BH/oRHjZSf
Behavioral task
behavioral1
Sample
nyxia.exe
Resource
win7-20240611-en
Malware Config
Targets
-
-
Target
nyxia.exe
-
Size
3.3MB
-
MD5
51393a0442f9c01f59a597b1218887c8
-
SHA1
2b48afc21ab4a30dd6b8ce4d8907c9062fb4d95c
-
SHA256
19bddef132af20da74c89fb263b1ae89f9762eba06382e69cccdfc9048e45917
-
SHA512
f492083b0b3cb86b4367da9fd7040b49de9d9643fef7f61b77815f761b0bec9eae3a61fdebe549ff1f9cf97c8b53cd7f7c44df4501f9a0f9baca87b502ac9de2
-
SSDEEP
49152:ZPk827hGqT5yCL8FBo+IvuxVDK5rdynF4hNhLus6E9ku/8vpsS2vaovBlZ58aotR:Z88ypGOV0sPuvpsSIaM50tZjlBtB4I
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-