General
-
Target
NitroRansomware.exe
-
Size
62KB
-
Sample
231219-cxqlwsgbf3
-
MD5
6157665ca331848ecbb635594556e6ee
-
SHA1
f115e226b9c983a2a8a7b97669855e606fc6194f
-
SHA256
6192f2e5cf81bd7eb80f2e26a57a489a7d1d44295ac497d11671f7cc405e342a
-
SHA512
f7057bd03ed1857608d3c41ede6c8fc75d62575f20d7e52ff805bce33e035f32a93aedf85f557c15f5268d5af64a9254dac7960afb134259ad3a63e6c1a73be8
-
SSDEEP
768:2OsMqCXfVcHfy1kPPE7TycANItIvYLDwUzc80gmq3oP/oDc:2Osvk+PzcAq7r/0O8/og
Static task
static1
Behavioral task
behavioral1
Sample
NitroRansomware.exe
Resource
win10-20231215-en
Malware Config
Targets
-
-
Target
NitroRansomware.exe
-
Size
62KB
-
MD5
6157665ca331848ecbb635594556e6ee
-
SHA1
f115e226b9c983a2a8a7b97669855e606fc6194f
-
SHA256
6192f2e5cf81bd7eb80f2e26a57a489a7d1d44295ac497d11671f7cc405e342a
-
SHA512
f7057bd03ed1857608d3c41ede6c8fc75d62575f20d7e52ff805bce33e035f32a93aedf85f557c15f5268d5af64a9254dac7960afb134259ad3a63e6c1a73be8
-
SSDEEP
768:2OsMqCXfVcHfy1kPPE7TycANItIvYLDwUzc80gmq3oP/oDc:2Osvk+PzcAq7r/0O8/og
Score10/10-
Renames multiple (87) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-