General

  • Target

    Nitro_Generator.exe

  • Size

    17.9MB

  • Sample

    231010-zj4ypaaa7x

  • MD5

    39ad3ddbdc72499bf95d514a1047641e

  • SHA1

    414419c7999659b0f20e9f8c863cb126ca3110f5

  • SHA256

    d62342f7dab973db97c508d7d09934511d744d260cd99e51a8ed25cd5e9dbb48

  • SHA512

    00d4a5d876c7be0582721e57c0a1338f4c741d2367a7221a55524085b10da30da911a5960cab7a1046adc9d99d4d0c47f872cd79724b01fff127b0561b20c046

  • SSDEEP

    393216:fDUdM2QDXYEF08OshouIkPItRL5QkWw76oCvdSsv:fDUdM2Q7YEGtwouktRLikx

Malware Config

Targets

    • Target

      Nitro_Generator.exe

    • Size

      17.9MB

    • MD5

      39ad3ddbdc72499bf95d514a1047641e

    • SHA1

      414419c7999659b0f20e9f8c863cb126ca3110f5

    • SHA256

      d62342f7dab973db97c508d7d09934511d744d260cd99e51a8ed25cd5e9dbb48

    • SHA512

      00d4a5d876c7be0582721e57c0a1338f4c741d2367a7221a55524085b10da30da911a5960cab7a1046adc9d99d4d0c47f872cd79724b01fff127b0561b20c046

    • SSDEEP

      393216:fDUdM2QDXYEF08OshouIkPItRL5QkWw76oCvdSsv:fDUdM2Q7YEGtwouktRLikx

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks