General

  • Target

    70e4e301109564dc54617ac74edb4770.bin

  • Size

    690KB

  • Sample

    231127-clqgradg27

  • MD5

    70e4e301109564dc54617ac74edb4770

  • SHA1

    26e1c6ce39150bb6aeb8473e5c2438ffd7190537

  • SHA256

    402ee7839d85633b339e4c03aa4baeac4a2a6bc5338d20b3ced3d6314c1cec0c

  • SHA512

    018f2354783579a102c216db38aa4b1220d6072337dbc377c6bb9a8f284672efdfb654465a821de3f0f0c3ad801f79ecd97e09f718a336fce79abcb5cbaf2b3a

  • SSDEEP

    12288:H4+ACgkCHHdmg0ByvR4mWWaqMpWTYkmIWXoKOvp5y8HN7CzsXgxx9/06UqU4q:IkamxmWeeWFDuorh57HN7Czswxj/tVO

Malware Config

Targets

    • Target

      70e4e301109564dc54617ac74edb4770.bin

    • Size

      690KB

    • MD5

      70e4e301109564dc54617ac74edb4770

    • SHA1

      26e1c6ce39150bb6aeb8473e5c2438ffd7190537

    • SHA256

      402ee7839d85633b339e4c03aa4baeac4a2a6bc5338d20b3ced3d6314c1cec0c

    • SHA512

      018f2354783579a102c216db38aa4b1220d6072337dbc377c6bb9a8f284672efdfb654465a821de3f0f0c3ad801f79ecd97e09f718a336fce79abcb5cbaf2b3a

    • SSDEEP

      12288:H4+ACgkCHHdmg0ByvR4mWWaqMpWTYkmIWXoKOvp5y8HN7CzsXgxx9/06UqU4q:IkamxmWeeWFDuorh57HN7Czswxj/tVO

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • Renames multiple (79) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Renames multiple (85) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks