Resubmissions

30-06-2023 03:23

230630-dxn9hagh4t 10

30-06-2023 03:00

230630-dhqh1sgh3s 10

General

  • Target

    NitroRansomware.exe

  • Size

    61KB

  • Sample

    230630-dxn9hagh4t

  • MD5

    f34e35e3380bd7b8744a0468c3b6c5f6

  • SHA1

    52cfedab61625567d963a6e5bfa89ff128571796

  • SHA256

    86ade3c887b60e3acb896236eb9cb11508140f9eb2e551e309006b04dd3dc645

  • SHA512

    e0361b40017c7b39fc928d93b1d3e119393a676f61147ebf158c95013bb9f11b769d3416c508ffc894f3ae2f9510f490a303933573137b154685c08da66d37b7

  • SSDEEP

    768:aKsMqCXfVcWlzM9ZkiANIUakYLDwUzc80gmq3oP/oDD:aKse1M9ZkiAPYr/0O8/o/

Malware Config

Targets

    • Target

      NitroRansomware.exe

    • Size

      61KB

    • MD5

      f34e35e3380bd7b8744a0468c3b6c5f6

    • SHA1

      52cfedab61625567d963a6e5bfa89ff128571796

    • SHA256

      86ade3c887b60e3acb896236eb9cb11508140f9eb2e551e309006b04dd3dc645

    • SHA512

      e0361b40017c7b39fc928d93b1d3e119393a676f61147ebf158c95013bb9f11b769d3416c508ffc894f3ae2f9510f490a303933573137b154685c08da66d37b7

    • SSDEEP

      768:aKsMqCXfVcWlzM9ZkiANIUakYLDwUzc80gmq3oP/oDD:aKse1M9ZkiAPYr/0O8/o/

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks