General

  • Target

    nitro.zip

  • Size

    160KB

  • Sample

    221115-f1bhxsfa74

  • MD5

    b81672770e0610b00421c8822ed8b1d2

  • SHA1

    9d4c8a7a309957cd9bbf95a1e750cc60760402cb

  • SHA256

    72198d0c025e9866510cb454e38b5099d345ff627ab04ba3205954142f7decda

  • SHA512

    4ff65c6cf8a2d8bfaef947517eb55f70cb3267f4bf32b5e19cad7bc88a7aaf6bb526e329e28c1605ee7e7ad1c3f7d65a334e3a54ae6270f408c38c27047783f5

  • SSDEEP

    3072:J0O62dUcflC7iHRTEur1hI4HUENiAS/N8x7Y02rzV2P4aD8tnPinAA6:WODYuH2uRhHqAS/Nm75jt/nAA6

Malware Config

Targets

    • Target

      nitro.zip

    • Size

      160KB

    • MD5

      b81672770e0610b00421c8822ed8b1d2

    • SHA1

      9d4c8a7a309957cd9bbf95a1e750cc60760402cb

    • SHA256

      72198d0c025e9866510cb454e38b5099d345ff627ab04ba3205954142f7decda

    • SHA512

      4ff65c6cf8a2d8bfaef947517eb55f70cb3267f4bf32b5e19cad7bc88a7aaf6bb526e329e28c1605ee7e7ad1c3f7d65a334e3a54ae6270f408c38c27047783f5

    • SSDEEP

      3072:J0O62dUcflC7iHRTEur1hI4HUENiAS/N8x7Y02rzV2P4aD8tnPinAA6:WODYuH2uRhHqAS/Nm75jt/nAA6

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks