Resubmissions

04-07-2023 04:31

230704-e5fg1ace91 10

04-07-2023 04:30

230704-e4z51sba89 10

04-07-2023 04:28

230704-e34f2sce9t 10

General

  • Target

    NitroRansomware.exe

  • Size

    1.5MB

  • Sample

    230704-e34f2sce9t

  • MD5

    662b89fc83ffec95d0d1fb911e8b3f8e

  • SHA1

    464d3f513e0f05ed342d1d512611fbd17560ba38

  • SHA256

    8225c8ed538083338ff8441c73e6a9faa77c6fb8b58a19355fed6edb7e4805d4

  • SHA512

    b23a6981f424c2165b031daed2159286786767b51b0b2dc5d31b03282c3b97306ae58b078217aef785a806e7f8dd754e8e36cb7bc5a9af507c9b08bea7a7f266

  • SSDEEP

    49152:lpYGwfZPzodngwwHv5VbtHw1kqXfd+/9A:lmDZbIgNhVRw1kqXf0F

Malware Config

Targets

    • Target

      NitroRansomware.exe

    • Size

      1.5MB

    • MD5

      662b89fc83ffec95d0d1fb911e8b3f8e

    • SHA1

      464d3f513e0f05ed342d1d512611fbd17560ba38

    • SHA256

      8225c8ed538083338ff8441c73e6a9faa77c6fb8b58a19355fed6edb7e4805d4

    • SHA512

      b23a6981f424c2165b031daed2159286786767b51b0b2dc5d31b03282c3b97306ae58b078217aef785a806e7f8dd754e8e36cb7bc5a9af507c9b08bea7a7f266

    • SSDEEP

      49152:lpYGwfZPzodngwwHv5VbtHw1kqXfd+/9A:lmDZbIgNhVRw1kqXf0F

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • UAC bypass

    • Disables Task Manager via registry modification

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks