General

  • Target

    Free_nitro.exe

  • Size

    14.4MB

  • Sample

    231018-btw4tsae2w

  • MD5

    7bf37f708bc84f0d191ab8c4931cf39d

  • SHA1

    578fbd84200db50d40a048f2bdc20866fca866d1

  • SHA256

    0157dafc3b6c03c554ec19c6012f9582e532b372c68ef6cb860c488822a242c6

  • SHA512

    402595b12c4dc9d69e56fb0ef92a144758435bfe433bcc93a98fe50f686c5f5f4d3b47d5530ae56693b72e5cc7b7b0cd05d3744b566a1e338a52f8f1b8bb29a8

  • SSDEEP

    393216:1iIE7YoPQ5dQuslSq99oWOv+9fgSguXRQe:a7rPQ5dQuSDorvSYSgwQ

Malware Config

Targets

    • Target

      Free_nitro.exe

    • Size

      14.4MB

    • MD5

      7bf37f708bc84f0d191ab8c4931cf39d

    • SHA1

      578fbd84200db50d40a048f2bdc20866fca866d1

    • SHA256

      0157dafc3b6c03c554ec19c6012f9582e532b372c68ef6cb860c488822a242c6

    • SHA512

      402595b12c4dc9d69e56fb0ef92a144758435bfe433bcc93a98fe50f686c5f5f4d3b47d5530ae56693b72e5cc7b7b0cd05d3744b566a1e338a52f8f1b8bb29a8

    • SSDEEP

      393216:1iIE7YoPQ5dQuslSq99oWOv+9fgSguXRQe:a7rPQ5dQuSDorvSYSgwQ

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks