General

  • Target

    NitroRansomware.exe

  • Size

    1.0MB

  • Sample

    230701-l7j2jagf55

  • MD5

    16a6c727c21914b28956ea6b9df5399b

  • SHA1

    d22d2e73df6539b4cdf7a03190e945db0463ef7b

  • SHA256

    7211e4c17bfcf8eb7630a4f48c271a03c11ded335a390ea2e0573a94b3627dec

  • SHA512

    88fee2511baa2bafceda30578056abda5a920a1de0ec61704aa86c77ed416826a2c62acc4acaa3c634c0ab305a74559bf00e92c67c585cf95c4329a30e7cb3fc

  • SSDEEP

    24576:UOYGGjodngwtlaHxN8KUWVe6tw2wvKhLnLi:UOYG2odngwwHv5VbtHw

Malware Config

Targets

    • Target

      NitroRansomware.exe

    • Size

      1.0MB

    • MD5

      16a6c727c21914b28956ea6b9df5399b

    • SHA1

      d22d2e73df6539b4cdf7a03190e945db0463ef7b

    • SHA256

      7211e4c17bfcf8eb7630a4f48c271a03c11ded335a390ea2e0573a94b3627dec

    • SHA512

      88fee2511baa2bafceda30578056abda5a920a1de0ec61704aa86c77ed416826a2c62acc4acaa3c634c0ab305a74559bf00e92c67c585cf95c4329a30e7cb3fc

    • SSDEEP

      24576:UOYGGjodngwtlaHxN8KUWVe6tw2wvKhLnLi:UOYG2odngwwHv5VbtHw

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • UAC bypass

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks