General
-
Target
NitroRansomware.exe
-
Size
61KB
-
Sample
230630-dxn9hagh4t
-
MD5
f34e35e3380bd7b8744a0468c3b6c5f6
-
SHA1
52cfedab61625567d963a6e5bfa89ff128571796
-
SHA256
86ade3c887b60e3acb896236eb9cb11508140f9eb2e551e309006b04dd3dc645
-
SHA512
e0361b40017c7b39fc928d93b1d3e119393a676f61147ebf158c95013bb9f11b769d3416c508ffc894f3ae2f9510f490a303933573137b154685c08da66d37b7
-
SSDEEP
768:aKsMqCXfVcWlzM9ZkiANIUakYLDwUzc80gmq3oP/oDD:aKse1M9ZkiAPYr/0O8/o/
Static task
static1
Behavioral task
behavioral1
Sample
NitroRansomware.exe
Resource
win10v2004-20230621-en
Malware Config
Targets
-
-
Target
NitroRansomware.exe
-
Size
61KB
-
MD5
f34e35e3380bd7b8744a0468c3b6c5f6
-
SHA1
52cfedab61625567d963a6e5bfa89ff128571796
-
SHA256
86ade3c887b60e3acb896236eb9cb11508140f9eb2e551e309006b04dd3dc645
-
SHA512
e0361b40017c7b39fc928d93b1d3e119393a676f61147ebf158c95013bb9f11b769d3416c508ffc894f3ae2f9510f490a303933573137b154685c08da66d37b7
-
SSDEEP
768:aKsMqCXfVcWlzM9ZkiANIUakYLDwUzc80gmq3oP/oDD:aKse1M9ZkiAPYr/0O8/o/
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-