Resubmissions

02-07-2023 00:40

230702-a1l2rsab35 10

02-07-2023 00:38

230702-azgqnaab32 10

General

  • Target

    NitroRansomware.exe

  • Size

    1.3MB

  • Sample

    230702-a1l2rsab35

  • MD5

    4d306858073b2a678c7562a3e845a63a

  • SHA1

    4c6364886770069508bfdd236f54f246cdf61188

  • SHA256

    2c120f921e46cdb14f70e8723338ff34465495bfa3955e3df6972d606b4ed202

  • SHA512

    92c85a20ec85010c04c35cc45eca023307968d5b6280391060564113b5e02b7f5e14a751f01b5c31d19d5298f87e24939570dd56b6898520c19de5703795c091

  • SSDEEP

    24576:66YGGjodngwtlaHxN8KUWVe6tw2wvKhLnekqjVnlqud+/2P+Ap4:66YG2odngwwHv5VbtHw1kqXfd+/9A

Malware Config

Targets

    • Target

      NitroRansomware.exe

    • Size

      1.3MB

    • MD5

      4d306858073b2a678c7562a3e845a63a

    • SHA1

      4c6364886770069508bfdd236f54f246cdf61188

    • SHA256

      2c120f921e46cdb14f70e8723338ff34465495bfa3955e3df6972d606b4ed202

    • SHA512

      92c85a20ec85010c04c35cc45eca023307968d5b6280391060564113b5e02b7f5e14a751f01b5c31d19d5298f87e24939570dd56b6898520c19de5703795c091

    • SSDEEP

      24576:66YGGjodngwtlaHxN8KUWVe6tw2wvKhLnekqjVnlqud+/2P+Ap4:66YG2odngwwHv5VbtHw1kqXfd+/9A

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • UAC bypass

    • AgentTesla payload

    • Disables Task Manager via registry modification

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks