General
-
Target
nitro.zip
-
Size
160KB
-
Sample
221115-f1bhxsfa74
-
MD5
b81672770e0610b00421c8822ed8b1d2
-
SHA1
9d4c8a7a309957cd9bbf95a1e750cc60760402cb
-
SHA256
72198d0c025e9866510cb454e38b5099d345ff627ab04ba3205954142f7decda
-
SHA512
4ff65c6cf8a2d8bfaef947517eb55f70cb3267f4bf32b5e19cad7bc88a7aaf6bb526e329e28c1605ee7e7ad1c3f7d65a334e3a54ae6270f408c38c27047783f5
-
SSDEEP
3072:J0O62dUcflC7iHRTEur1hI4HUENiAS/N8x7Y02rzV2P4aD8tnPinAA6:WODYuH2uRhHqAS/Nm75jt/nAA6
Static task
static1
Behavioral task
behavioral1
Sample
nitro.zip
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
nitro.zip
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
nitro.zip
-
Size
160KB
-
MD5
b81672770e0610b00421c8822ed8b1d2
-
SHA1
9d4c8a7a309957cd9bbf95a1e750cc60760402cb
-
SHA256
72198d0c025e9866510cb454e38b5099d345ff627ab04ba3205954142f7decda
-
SHA512
4ff65c6cf8a2d8bfaef947517eb55f70cb3267f4bf32b5e19cad7bc88a7aaf6bb526e329e28c1605ee7e7ad1c3f7d65a334e3a54ae6270f408c38c27047783f5
-
SSDEEP
3072:J0O62dUcflC7iHRTEur1hI4HUENiAS/N8x7Y02rzV2P4aD8tnPinAA6:WODYuH2uRhHqAS/Nm75jt/nAA6
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-