General
-
Target
Nighty.exe
-
Size
192.0MB
-
Sample
241120-dyc8mazbjf
-
MD5
ccd9e789f519a677d00b4a9bf860361e
-
SHA1
efc1f5fe7729e52cfab7f0c5afdef9f7e698eb58
-
SHA256
a6588945a60aefa9c868995d688988e81f0a196bd82aef882020718f0d3b14bc
-
SHA512
db60ac0b375bb359606700d750a9cbb516dbf65141db343d1387dc6e17e369f525479765077ba75a175026cefd43cbf55b008bf6874d7fcf42e705222af8b3ee
-
SSDEEP
6291456:nEJgwPXjtGagCMy2CY0jCXWz8eJ9LzJ5+PCaM3:nqHPXj15MyLrCs99f7+s
Behavioral task
behavioral1
Sample
Nighty.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
Nighty.exe
-
Size
192.0MB
-
MD5
ccd9e789f519a677d00b4a9bf860361e
-
SHA1
efc1f5fe7729e52cfab7f0c5afdef9f7e698eb58
-
SHA256
a6588945a60aefa9c868995d688988e81f0a196bd82aef882020718f0d3b14bc
-
SHA512
db60ac0b375bb359606700d750a9cbb516dbf65141db343d1387dc6e17e369f525479765077ba75a175026cefd43cbf55b008bf6874d7fcf42e705222af8b3ee
-
SSDEEP
6291456:nEJgwPXjtGagCMy2CY0jCXWz8eJ9LzJ5+PCaM3:nqHPXj15MyLrCs99f7+s
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
A potential corporate email address has been identified in the URL: fonts@1
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
2Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1