General
-
Target
NITRO_GEN_V1.exe
-
Size
17.0MB
-
Sample
240429-y2f4xabe35
-
MD5
3cf5dc418619c389e746a0e64ac4c75d
-
SHA1
8fa9e914fdbe55d379ad0f79752a3292e4b75211
-
SHA256
f6974b77eb8883b6db5cf93ece824501f27567fa3ac03fbc6c1935b1b070e4ab
-
SHA512
9bfb1b342c65e1851c476882530fdebe045a2184ad859c3a29ee42a255310012fcc6cce62c75e90e92b151e7928347f33433091f22d2bd46e5f18a07efc2b1ed
-
SSDEEP
393216:2v9EokQhXGzNh2Jp5M8cFqyzgsmUvNoiBhLoR0:I92QGNhyXyxFoO
Behavioral task
behavioral1
Sample
NITRO_GEN_V1.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
NITRO_GEN_V1.exe
-
Size
17.0MB
-
MD5
3cf5dc418619c389e746a0e64ac4c75d
-
SHA1
8fa9e914fdbe55d379ad0f79752a3292e4b75211
-
SHA256
f6974b77eb8883b6db5cf93ece824501f27567fa3ac03fbc6c1935b1b070e4ab
-
SHA512
9bfb1b342c65e1851c476882530fdebe045a2184ad859c3a29ee42a255310012fcc6cce62c75e90e92b151e7928347f33433091f22d2bd46e5f18a07efc2b1ed
-
SSDEEP
393216:2v9EokQhXGzNh2Jp5M8cFqyzgsmUvNoiBhLoR0:I92QGNhyXyxFoO
-
Drops startup file
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-