Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
17/07/2023, 17:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Nitro Generator.exe
Resource
win7-20230712-en
4 signatures
150 seconds
General
-
Target
Nitro Generator.exe
-
Size
11KB
-
MD5
5d8785dc8dea92f99e0d53b149a80b39
-
SHA1
c02f8269adf0fdbb7189862088e0e2bd7f314ad5
-
SHA256
5f11bc2a433db184faa4e5a2258c51f275a2d11564e11ef97bb5618d9b0e6a73
-
SHA512
05bc19a8af9fa3e5322041656b052d00348acdf5acdeea4ba1cf99fcc325dceae67130a1dba3149c66f4d7ee727a744ca18aa1e504c943d8882d80afa25d30d8
-
SSDEEP
192:sSW+kvgSzGcxq9LWBHz0D63KvyzxZIMUqddZ:4+kYJcxq9Leom38yzxku
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip4.seeip.org 4 ip4.seeip.org 7 ip4.seeip.org -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 832 Nitro Generator.exe