General

  • Target

    nitro gen v3.exe

  • Size

    21.8MB

  • Sample

    230401-yqe3gadf9s

  • MD5

    bc80fec534eb76e9441d2502a75f80f9

  • SHA1

    07b6262e4371128e91103435d831ee05da16c283

  • SHA256

    90e12ba315ea50dff5c37d9d861ce77fcf97cdab482cceef432704cec5c5709c

  • SHA512

    4e365d0fc3ef366b0a8e189be92ee0e8d1ab83b33564c0871ca21eabc3e56a7112c563f23e33989d9b9f6dc8bea28f57772fe0dd65892da168769255138be43c

  • SSDEEP

    393216:Ku7L/FD/tFKxzKcPbxy/m3poaUX47d4zYt8ZMzdCtd1ats:KCLthEzrEKoaUI7d4zYtdMat

Malware Config

Targets

    • Target

      nitro gen v3.exe

    • Size

      21.8MB

    • MD5

      bc80fec534eb76e9441d2502a75f80f9

    • SHA1

      07b6262e4371128e91103435d831ee05da16c283

    • SHA256

      90e12ba315ea50dff5c37d9d861ce77fcf97cdab482cceef432704cec5c5709c

    • SHA512

      4e365d0fc3ef366b0a8e189be92ee0e8d1ab83b33564c0871ca21eabc3e56a7112c563f23e33989d9b9f6dc8bea28f57772fe0dd65892da168769255138be43c

    • SSDEEP

      393216:Ku7L/FD/tFKxzKcPbxy/m3poaUX47d4zYt8ZMzdCtd1ats:KCLthEzrEKoaUI7d4zYtdMat

    Score
    7/10
    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks