General

  • Target

    28c6930ca323e61d91b92e4bb843d0bb

  • Size

    61KB

  • Sample

    210812-t3tltlyca2

  • MD5

    28c6930ca323e61d91b92e4bb843d0bb

  • SHA1

    a2699d09bc912dff2cce4f1ebb1ad5e5dc470cf9

  • SHA256

    33ee355f77eef2768f6f5e210f008eb78e396f4adc97f090124ced1100507679

  • SHA512

    c0c44664f5f6e717f9878776f443fd56cffe87db6bc96ad80a74483aa2bf04ebbe7506d5387e661c185260d04372ccf28f96770e8348199514060b9e452d456a

Malware Config

Targets

    • Target

      28c6930ca323e61d91b92e4bb843d0bb

    • Size

      61KB

    • MD5

      28c6930ca323e61d91b92e4bb843d0bb

    • SHA1

      a2699d09bc912dff2cce4f1ebb1ad5e5dc470cf9

    • SHA256

      33ee355f77eef2768f6f5e210f008eb78e396f4adc97f090124ced1100507679

    • SHA512

      c0c44664f5f6e717f9878776f443fd56cffe87db6bc96ad80a74483aa2bf04ebbe7506d5387e661c185260d04372ccf28f96770e8348199514060b9e452d456a

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks