General

  • Target

    Nitro_Generator.exe

  • Size

    6.9MB

  • Sample

    240427-w5q26see9v

  • MD5

    f90c5aa601826afa515535a227365fc1

  • SHA1

    4be0bf1d545ed2d1eba7626914e06953a148e376

  • SHA256

    564cfef3360e9762e4531d9b89410904cf31549793fa8ec9b87b82ea79934f0c

  • SHA512

    ee523dce3d4f3ac5a6ce60ceec8e4e8af2e808125c022957b9e1f8b538a38e67f16040c152f575b73cf71e60f99e71dccd82d21cd86ee457506759f4b5ca5cdd

  • SSDEEP

    98304:4r6/zHqdVfB2FS27wk55yuT/9vUIdD9C+z3zO917vOTh+ezDNh7xvmJ1nmOBN9nm:4r6TQs/55bT/9bvLz3S1bA3zgn97v4

Malware Config

Targets

    • Target

      Nitro_Generator.exe

    • Size

      6.9MB

    • MD5

      f90c5aa601826afa515535a227365fc1

    • SHA1

      4be0bf1d545ed2d1eba7626914e06953a148e376

    • SHA256

      564cfef3360e9762e4531d9b89410904cf31549793fa8ec9b87b82ea79934f0c

    • SHA512

      ee523dce3d4f3ac5a6ce60ceec8e4e8af2e808125c022957b9e1f8b538a38e67f16040c152f575b73cf71e60f99e71dccd82d21cd86ee457506759f4b5ca5cdd

    • SSDEEP

      98304:4r6/zHqdVfB2FS27wk55yuT/9vUIdD9C+z3zO917vOTh+ezDNh7xvmJ1nmOBN9nm:4r6TQs/55bT/9bvLz3S1bA3zgn97v4

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks