General

  • Target

    92eea22c70cf0fe4116b1021e91eb373

  • Size

    61KB

  • Sample

    210812-yn4wfndeaa

  • MD5

    92eea22c70cf0fe4116b1021e91eb373

  • SHA1

    66b8c24be3b82ecbbebb5e5a70ddf746d212e16f

  • SHA256

    73d55d99c41e89daa8c9bd213d02974d89b53c3e5a0dcd5bbf0b99ff36424cac

  • SHA512

    b8d2b6bba4027bda2ac3ef09c346a1e8ee768afb990bcacbd860bbead42a420303814e4f4081a32b81f89085b53879f7ce888c864cf34654a7c066facb44d035

Malware Config

Targets

    • Target

      92eea22c70cf0fe4116b1021e91eb373

    • Size

      61KB

    • MD5

      92eea22c70cf0fe4116b1021e91eb373

    • SHA1

      66b8c24be3b82ecbbebb5e5a70ddf746d212e16f

    • SHA256

      73d55d99c41e89daa8c9bd213d02974d89b53c3e5a0dcd5bbf0b99ff36424cac

    • SHA512

      b8d2b6bba4027bda2ac3ef09c346a1e8ee768afb990bcacbd860bbead42a420303814e4f4081a32b81f89085b53879f7ce888c864cf34654a7c066facb44d035

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks