General

  • Target

    Nighty.exe

  • Size

    192.0MB

  • Sample

    241120-dyc8mazbjf

  • MD5

    ccd9e789f519a677d00b4a9bf860361e

  • SHA1

    efc1f5fe7729e52cfab7f0c5afdef9f7e698eb58

  • SHA256

    a6588945a60aefa9c868995d688988e81f0a196bd82aef882020718f0d3b14bc

  • SHA512

    db60ac0b375bb359606700d750a9cbb516dbf65141db343d1387dc6e17e369f525479765077ba75a175026cefd43cbf55b008bf6874d7fcf42e705222af8b3ee

  • SSDEEP

    6291456:nEJgwPXjtGagCMy2CY0jCXWz8eJ9LzJ5+PCaM3:nqHPXj15MyLrCs99f7+s

Malware Config

Targets

    • Target

      Nighty.exe

    • Size

      192.0MB

    • MD5

      ccd9e789f519a677d00b4a9bf860361e

    • SHA1

      efc1f5fe7729e52cfab7f0c5afdef9f7e698eb58

    • SHA256

      a6588945a60aefa9c868995d688988e81f0a196bd82aef882020718f0d3b14bc

    • SHA512

      db60ac0b375bb359606700d750a9cbb516dbf65141db343d1387dc6e17e369f525479765077ba75a175026cefd43cbf55b008bf6874d7fcf42e705222af8b3ee

    • SSDEEP

      6291456:nEJgwPXjtGagCMy2CY0jCXWz8eJ9LzJ5+PCaM3:nqHPXj15MyLrCs99f7+s

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • A potential corporate email address has been identified in the URL: fonts@1

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks