General
-
Target
Nexus.exe
-
Size
1.4MB
-
Sample
240920-dnb8ksvhjd
-
MD5
8b494166a252d874c81e5be1e070fb58
-
SHA1
ebf82b136e93b2146d5e0fa4e71e738718988fa0
-
SHA256
8a2ad73f7145775cd6031e3a0ead788a50dab29e30c1396296e8813e57e5cfa4
-
SHA512
6300e5207d0858a51618e5e47be129739711da5916a85cc7b680cc519987f2f6c6f30bbab1016319368ab917846a47848068dea2eb8d7b897e62b7778da0ac6c
-
SSDEEP
24576:f4R3sAPRcCnCgYpNX/scAsrNYYSl4WNoDD3y7qYj58MGAEkZd5703vN1lnLp3GXa:ApsAPRcYrYptPiYS/oDD3MN8HGq3XlnN
Static task
static1
Behavioral task
behavioral1
Sample
Nexus.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Nexus.exe
Resource
win10v2004-20240910-en
Malware Config
Targets
-
-
Target
Nexus.exe
-
Size
1.4MB
-
MD5
8b494166a252d874c81e5be1e070fb58
-
SHA1
ebf82b136e93b2146d5e0fa4e71e738718988fa0
-
SHA256
8a2ad73f7145775cd6031e3a0ead788a50dab29e30c1396296e8813e57e5cfa4
-
SHA512
6300e5207d0858a51618e5e47be129739711da5916a85cc7b680cc519987f2f6c6f30bbab1016319368ab917846a47848068dea2eb8d7b897e62b7778da0ac6c
-
SSDEEP
24576:f4R3sAPRcCnCgYpNX/scAsrNYYSl4WNoDD3y7qYj58MGAEkZd5703vN1lnLp3GXa:ApsAPRcYrYptPiYS/oDD3MN8HGq3XlnN
-
Modifies security service
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
3Windows Service
3Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
3Windows Service
3Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
3Disable or Modify Tools
2Modify Registry
4Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3