General
-
Target
Hydrargyrum.zip
-
Size
6.9MB
-
Sample
250404-czay8a1jt7
-
MD5
e804887e3363ff2bca7941043f8a8bd4
-
SHA1
fdc393353a0e17c697f58364fb096e71ff374953
-
SHA256
2a43c2d26e4a34e67016e6ec122c70ae2851112e07d1f8798a8dcf2af87e4eed
-
SHA512
6856e8831107d0b41474ed2b0f046992fe84c5cb79b85ec5eaf0954744b78e3a8afad7b618405a0559c77f321d1c08c722267ae0cc8f937ccd33d158ea15ca14
-
SSDEEP
196608:rU1aaysD7AGOsL9bsqg0UU4t27nuy6hfSFfIodrl:IXwI9AqgPUXDuLhfGfIoX
Behavioral task
behavioral1
Sample
Hydrargyrum.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
Hydrargyrum.harmless.exe
Resource
win10v2004-20250313-en
Malware Config
Targets
-
-
Target
Hydrargyrum.exe
-
Size
3.7MB
-
MD5
a0a8391a92e6c46ab606fcd57cf4f4a4
-
SHA1
930e6f27b6007529edff5371a1793b36a05d76ee
-
SHA256
dd97db57914c2b501d6a0762ff8e1dca8f921aec80887e2d3842b399bea16571
-
SHA512
80798537a6c7fb585e19f399741230fed26d398bcfa17196b9e2d2de9aae1f8b0c33674113e676de390fff4cceeaea2b04976c82d5ab75f955eb51a44f90bcd7
-
SSDEEP
98304:mqZyM3zLdY32bVNZKCIHcF1T1S2kG6nl6A:TsAZY32PsFIsXl6
-
Modifies WinLogon for persistence
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks whether UAC is enabled
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
Hydrargyrum.harmless.exe
-
Size
3.6MB
-
MD5
e253841459b798a5ca861daaeb44ff5c
-
SHA1
9d4069fb41c3dfa9314ece82efde72d8602ce9b7
-
SHA256
d3b50942c8262e5bd658a3938e3218168adbfe86698a55bd02f6a94fd7afbbfe
-
SHA512
99d3328f52de8995467c32797ad81a8d37b93e814a535bffd617b5a8aed0a2412f1e037eb28f1d6e3777dfb1fed25429b2da2ae6dab1645dfce7cb792f9a11db
-
SSDEEP
49152:0hdgcpljaq6JfqRZBX8iYI9VwSUO+5+/uKLCsS7MSVQKpbfd56R0StwWkWo9Ck9B:0jpBqdqRLJZkdeSwSVQwf2x7KCKK
Score9/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks whether UAC is enabled
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Event Triggered Execution
1Image File Execution Options Injection
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Modify Registry
2Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
1