General

  • Target

    nyxia.zip

  • Size

    3.3MB

  • Sample

    240613-sr3bhathpd

  • MD5

    56f17b27ebc6745158c4c1bbe33e37cf

  • SHA1

    f6a2895bff8c1ca297847d41eb47c93ea22587a5

  • SHA256

    58d91d1cbe86643d2e638a2554e35479a88c289c7efb527abc4685ea7f281df5

  • SHA512

    f49e991ab5ef5044e60deab39f47297675703163c0e6fc35860fef46252f3c5b6601757425f703caff0aa0319b00d664c378deabfdbce0f86f76d7ae6a38a7c8

  • SSDEEP

    49152:dUo3c4JPoDLxCMEf51pgmQIVl65vdLT6ENytL8A3hGXoBC/gx/Ismly8hcMz6Kjq:ioVJwDLxCBLpa1PyQEG4BH/oRHjZSf

Malware Config

Targets

    • Target

      nyxia.exe

    • Size

      3.3MB

    • MD5

      51393a0442f9c01f59a597b1218887c8

    • SHA1

      2b48afc21ab4a30dd6b8ce4d8907c9062fb4d95c

    • SHA256

      19bddef132af20da74c89fb263b1ae89f9762eba06382e69cccdfc9048e45917

    • SHA512

      f492083b0b3cb86b4367da9fd7040b49de9d9643fef7f61b77815f761b0bec9eae3a61fdebe549ff1f9cf97c8b53cd7f7c44df4501f9a0f9baca87b502ac9de2

    • SSDEEP

      49152:ZPk827hGqT5yCL8FBo+IvuxVDK5rdynF4hNhLus6E9ku/8vpsS2vaovBlZ58aotR:Z88ypGOV0sPuvpsSIaM50tZjlBtB4I

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks