General

  • Target

    8f7cbd3b6294a51d05d845817a537c12

  • Size

    2.2MB

  • Sample

    210812-zt87j2scjn

  • MD5

    8f7cbd3b6294a51d05d845817a537c12

  • SHA1

    f8111013086ed399ca719f7ae1971b647791832e

  • SHA256

    a38318931bf23ba293888c2685d85b3cb376d86ca16d3348f7f5ed57165ac1a8

  • SHA512

    9759316db3b0b76e4ea97a40633f83800bed52433f803b195bae27282a98b877b94dae9fb832da87ab279876bcbe60a5dd23d97aefece3d9f7cd00fd39f31898

Malware Config

Targets

    • Target

      8f7cbd3b6294a51d05d845817a537c12

    • Size

      2.2MB

    • MD5

      8f7cbd3b6294a51d05d845817a537c12

    • SHA1

      f8111013086ed399ca719f7ae1971b647791832e

    • SHA256

      a38318931bf23ba293888c2685d85b3cb376d86ca16d3348f7f5ed57165ac1a8

    • SHA512

      9759316db3b0b76e4ea97a40633f83800bed52433f803b195bae27282a98b877b94dae9fb832da87ab279876bcbe60a5dd23d97aefece3d9f7cd00fd39f31898

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks