General

  • Target

    NitroRansomware.exe

  • Size

    62KB

  • Sample

    231219-cxqlwsgbf3

  • MD5

    6157665ca331848ecbb635594556e6ee

  • SHA1

    f115e226b9c983a2a8a7b97669855e606fc6194f

  • SHA256

    6192f2e5cf81bd7eb80f2e26a57a489a7d1d44295ac497d11671f7cc405e342a

  • SHA512

    f7057bd03ed1857608d3c41ede6c8fc75d62575f20d7e52ff805bce33e035f32a93aedf85f557c15f5268d5af64a9254dac7960afb134259ad3a63e6c1a73be8

  • SSDEEP

    768:2OsMqCXfVcHfy1kPPE7TycANItIvYLDwUzc80gmq3oP/oDc:2Osvk+PzcAq7r/0O8/og

Malware Config

Targets

    • Target

      NitroRansomware.exe

    • Size

      62KB

    • MD5

      6157665ca331848ecbb635594556e6ee

    • SHA1

      f115e226b9c983a2a8a7b97669855e606fc6194f

    • SHA256

      6192f2e5cf81bd7eb80f2e26a57a489a7d1d44295ac497d11671f7cc405e342a

    • SHA512

      f7057bd03ed1857608d3c41ede6c8fc75d62575f20d7e52ff805bce33e035f32a93aedf85f557c15f5268d5af64a9254dac7960afb134259ad3a63e6c1a73be8

    • SSDEEP

      768:2OsMqCXfVcHfy1kPPE7TycANItIvYLDwUzc80gmq3oP/oDc:2Osvk+PzcAq7r/0O8/og

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • Renames multiple (87) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks