General

  • Target

    NitroRansomware.exe

  • Size

    1.3MB

  • Sample

    230702-w8437scc49

  • MD5

    81549c5d1213c5fd10da736d9d0f2a5e

  • SHA1

    1bd47c7361843aa6662ca4d403542c0f18aed8ea

  • SHA256

    d4c387dadf62661ef2d3082a62c2afbc1ed0710dac9973870e5e06a1724297de

  • SHA512

    e32f6d593fb356ce046f2ac652dab0d4a84a3ab1924c94a819309f1ad3d6056c86aee785f1289573c374128a4e164a8988cdc79e77906c9705c0f0888f7ba6a3

  • SSDEEP

    24576:qoYGGjodngwtlaHxN8KUWVe6tw2wvKhLnekqjVnlqud+/2P+A6zP:qoYG2odngwwHv5VbtHw1kqXfd+/9A

Malware Config

Targets

    • Target

      NitroRansomware.exe

    • Size

      1.3MB

    • MD5

      81549c5d1213c5fd10da736d9d0f2a5e

    • SHA1

      1bd47c7361843aa6662ca4d403542c0f18aed8ea

    • SHA256

      d4c387dadf62661ef2d3082a62c2afbc1ed0710dac9973870e5e06a1724297de

    • SHA512

      e32f6d593fb356ce046f2ac652dab0d4a84a3ab1924c94a819309f1ad3d6056c86aee785f1289573c374128a4e164a8988cdc79e77906c9705c0f0888f7ba6a3

    • SSDEEP

      24576:qoYGGjodngwtlaHxN8KUWVe6tw2wvKhLnekqjVnlqud+/2P+A6zP:qoYG2odngwwHv5VbtHw1kqXfd+/9A

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • UAC bypass

    • AgentTesla payload

    • Disables Task Manager via registry modification

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks