General

  • Target

    NitroRansomware.exe

  • Size

    1.3MB

  • Sample

    230703-brmsdaec47

  • MD5

    3045686ac229ca8ea1c30217bcc4910e

  • SHA1

    0120e0dc05331a99ba6d937439b97e7ee68fcfc3

  • SHA256

    2bb0bec19264d1be7d41a921e6312b43a12dbb6e32b21eefcd388b3ad100aaa4

  • SHA512

    927f6094353d8bce48f280f4505ceb597c63245bd96459493565196a56212b7e747436cbfd92851116e42101756cb3d313e0b67e38a042b50e84842e4a66b732

  • SSDEEP

    24576:YWYGGwodngwtlaHxN8KUWVe6tw2wvKhLnekqjVnlqud+/2P+A+q:YWYGjodngwwHv5VbtHw1kqXfd+/9A

Malware Config

Targets

    • Target

      NitroRansomware.exe

    • Size

      1.3MB

    • MD5

      3045686ac229ca8ea1c30217bcc4910e

    • SHA1

      0120e0dc05331a99ba6d937439b97e7ee68fcfc3

    • SHA256

      2bb0bec19264d1be7d41a921e6312b43a12dbb6e32b21eefcd388b3ad100aaa4

    • SHA512

      927f6094353d8bce48f280f4505ceb597c63245bd96459493565196a56212b7e747436cbfd92851116e42101756cb3d313e0b67e38a042b50e84842e4a66b732

    • SSDEEP

      24576:YWYGGwodngwtlaHxN8KUWVe6tw2wvKhLnekqjVnlqud+/2P+A+q:YWYGjodngwwHv5VbtHw1kqXfd+/9A

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • UAC bypass

    • Disables Task Manager via registry modification

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks