General

  • Target

    cba654cf359b8d6175303ac28d6c1bd5

  • Size

    61KB

  • Sample

    240315-rtg8nsag9v

  • MD5

    cba654cf359b8d6175303ac28d6c1bd5

  • SHA1

    4ee1f00227c608083bf6f3a27d08e2a80da4472e

  • SHA256

    452122b0fe32b7ebf79cdc387378d6e5bdc65ef82e6b1c24f5e3a2b0e8ddfbe4

  • SHA512

    1307cda5755c056ce4b01c28a6b7d556bf302ea0829abd8c338bfe3fbcb51267d83f8eb2839d5f57eb8fdf3335a1841de0801b4a7cdf98e8a2fef9b12e7d250e

  • SSDEEP

    768:pKsMqCXfVcWlQM9ZkiANIULSYLDwUzc80gmq3oP/oD9:pKseSM9ZkiAPLr/0O8/o5

Malware Config

Targets

    • Target

      cba654cf359b8d6175303ac28d6c1bd5

    • Size

      61KB

    • MD5

      cba654cf359b8d6175303ac28d6c1bd5

    • SHA1

      4ee1f00227c608083bf6f3a27d08e2a80da4472e

    • SHA256

      452122b0fe32b7ebf79cdc387378d6e5bdc65ef82e6b1c24f5e3a2b0e8ddfbe4

    • SHA512

      1307cda5755c056ce4b01c28a6b7d556bf302ea0829abd8c338bfe3fbcb51267d83f8eb2839d5f57eb8fdf3335a1841de0801b4a7cdf98e8a2fef9b12e7d250e

    • SSDEEP

      768:pKsMqCXfVcWlQM9ZkiANIULSYLDwUzc80gmq3oP/oD9:pKseSM9ZkiAPLr/0O8/o5

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • Renames multiple (92) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Impact

Defacement

1
T1491

Tasks