General
-
Target
NitroRansomware.exe
-
Size
66KB
-
Sample
230630-zmllhsef84
-
MD5
fb8b40c35ce47a3e9c7106c3a9074812
-
SHA1
157158936a9ae7c26f9f2194e0e19cf2729362f3
-
SHA256
62bf001525c54efc9715f6562e58bce96a6283aed9acb13f330f0fc487220419
-
SHA512
9bf593e6fbad5c566e6526e7892f750f050cff2e6a255ce611bf51b85e214bba0e1bc2f8d13c6538ac2df16f00a80bebf74f7262ca6b9fd2c1becd211b8d98e6
-
SSDEEP
768:qH3DdNeB5G8tOHsvVXwmIkpLDwUzc80gmq3oP/oDT:a3RQB3tXWx0r/0O8/oP
Static task
static1
Behavioral task
behavioral1
Sample
NitroRansomware.exe
Resource
win10v2004-20230621-en
Malware Config
Targets
-
-
Target
NitroRansomware.exe
-
Size
66KB
-
MD5
fb8b40c35ce47a3e9c7106c3a9074812
-
SHA1
157158936a9ae7c26f9f2194e0e19cf2729362f3
-
SHA256
62bf001525c54efc9715f6562e58bce96a6283aed9acb13f330f0fc487220419
-
SHA512
9bf593e6fbad5c566e6526e7892f750f050cff2e6a255ce611bf51b85e214bba0e1bc2f8d13c6538ac2df16f00a80bebf74f7262ca6b9fd2c1becd211b8d98e6
-
SSDEEP
768:qH3DdNeB5G8tOHsvVXwmIkpLDwUzc80gmq3oP/oDT:a3RQB3tXWx0r/0O8/oP
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-