General
-
Target
NitroRansomware.exe
-
Size
1.3MB
-
Sample
230702-a1l2rsab35
-
MD5
4d306858073b2a678c7562a3e845a63a
-
SHA1
4c6364886770069508bfdd236f54f246cdf61188
-
SHA256
2c120f921e46cdb14f70e8723338ff34465495bfa3955e3df6972d606b4ed202
-
SHA512
92c85a20ec85010c04c35cc45eca023307968d5b6280391060564113b5e02b7f5e14a751f01b5c31d19d5298f87e24939570dd56b6898520c19de5703795c091
-
SSDEEP
24576:66YGGjodngwtlaHxN8KUWVe6tw2wvKhLnekqjVnlqud+/2P+Ap4:66YG2odngwwHv5VbtHw1kqXfd+/9A
Static task
static1
Behavioral task
behavioral1
Sample
NitroRansomware.exe
Resource
win10-20230621-en
Malware Config
Targets
-
-
Target
NitroRansomware.exe
-
Size
1.3MB
-
MD5
4d306858073b2a678c7562a3e845a63a
-
SHA1
4c6364886770069508bfdd236f54f246cdf61188
-
SHA256
2c120f921e46cdb14f70e8723338ff34465495bfa3955e3df6972d606b4ed202
-
SHA512
92c85a20ec85010c04c35cc45eca023307968d5b6280391060564113b5e02b7f5e14a751f01b5c31d19d5298f87e24939570dd56b6898520c19de5703795c091
-
SSDEEP
24576:66YGGjodngwtlaHxN8KUWVe6tw2wvKhLnekqjVnlqud+/2P+Ap4:66YG2odngwwHv5VbtHw1kqXfd+/9A
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Disables Task Manager via registry modification
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-