General
-
Target
NitroRansomware.exe
-
Size
1.0MB
-
Sample
230701-l7j2jagf55
-
MD5
16a6c727c21914b28956ea6b9df5399b
-
SHA1
d22d2e73df6539b4cdf7a03190e945db0463ef7b
-
SHA256
7211e4c17bfcf8eb7630a4f48c271a03c11ded335a390ea2e0573a94b3627dec
-
SHA512
88fee2511baa2bafceda30578056abda5a920a1de0ec61704aa86c77ed416826a2c62acc4acaa3c634c0ab305a74559bf00e92c67c585cf95c4329a30e7cb3fc
-
SSDEEP
24576:UOYGGjodngwtlaHxN8KUWVe6tw2wvKhLnLi:UOYG2odngwwHv5VbtHw
Static task
static1
Behavioral task
behavioral1
Sample
NitroRansomware.exe
Resource
win10v2004-20230621-en
Malware Config
Targets
-
-
Target
NitroRansomware.exe
-
Size
1.0MB
-
MD5
16a6c727c21914b28956ea6b9df5399b
-
SHA1
d22d2e73df6539b4cdf7a03190e945db0463ef7b
-
SHA256
7211e4c17bfcf8eb7630a4f48c271a03c11ded335a390ea2e0573a94b3627dec
-
SHA512
88fee2511baa2bafceda30578056abda5a920a1de0ec61704aa86c77ed416826a2c62acc4acaa3c634c0ab305a74559bf00e92c67c585cf95c4329a30e7cb3fc
-
SSDEEP
24576:UOYGGjodngwtlaHxN8KUWVe6tw2wvKhLnLi:UOYG2odngwwHv5VbtHw
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-