General

  • Target

    NITRO_GEN_V1.exe

  • Size

    17.0MB

  • Sample

    240429-y2f4xabe35

  • MD5

    3cf5dc418619c389e746a0e64ac4c75d

  • SHA1

    8fa9e914fdbe55d379ad0f79752a3292e4b75211

  • SHA256

    f6974b77eb8883b6db5cf93ece824501f27567fa3ac03fbc6c1935b1b070e4ab

  • SHA512

    9bfb1b342c65e1851c476882530fdebe045a2184ad859c3a29ee42a255310012fcc6cce62c75e90e92b151e7928347f33433091f22d2bd46e5f18a07efc2b1ed

  • SSDEEP

    393216:2v9EokQhXGzNh2Jp5M8cFqyzgsmUvNoiBhLoR0:I92QGNhyXyxFoO

Malware Config

Targets

    • Target

      NITRO_GEN_V1.exe

    • Size

      17.0MB

    • MD5

      3cf5dc418619c389e746a0e64ac4c75d

    • SHA1

      8fa9e914fdbe55d379ad0f79752a3292e4b75211

    • SHA256

      f6974b77eb8883b6db5cf93ece824501f27567fa3ac03fbc6c1935b1b070e4ab

    • SHA512

      9bfb1b342c65e1851c476882530fdebe045a2184ad859c3a29ee42a255310012fcc6cce62c75e90e92b151e7928347f33433091f22d2bd46e5f18a07efc2b1ed

    • SSDEEP

      393216:2v9EokQhXGzNh2Jp5M8cFqyzgsmUvNoiBhLoR0:I92QGNhyXyxFoO

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks