General

  • Target

    Free Nitro V0 (NICHT ÖFFNEN).exe

  • Size

    62KB

  • Sample

    240511-jq8mfseg8w

  • MD5

    73e79cff585cc828b27ecddc167bf328

  • SHA1

    2b909c3c36fb97a745db2dd89019ab69d6e1d619

  • SHA256

    56cc1b7f77c609d32658b8b3230257b3d00971aef4ff656b61c76823ae1b6da7

  • SHA512

    4f94c8dc8582a0bb48599e3eb6396d2ff796ec925e6ef0281caaa461b3fb77eff721c0bf431fb09dd063968a10eb60f7700e3ac82ed845a606d01ed9879627d9

  • SSDEEP

    768:PKsMqCXfVcWL/M9ZkiANIUKfYLDwUzc80gmq3oP/oDq:PKseTM9ZkiAP1r/0O8/o+

Malware Config

Targets

    • Target

      Free Nitro V0 (NICHT ÖFFNEN).exe

    • Size

      62KB

    • MD5

      73e79cff585cc828b27ecddc167bf328

    • SHA1

      2b909c3c36fb97a745db2dd89019ab69d6e1d619

    • SHA256

      56cc1b7f77c609d32658b8b3230257b3d00971aef4ff656b61c76823ae1b6da7

    • SHA512

      4f94c8dc8582a0bb48599e3eb6396d2ff796ec925e6ef0281caaa461b3fb77eff721c0bf431fb09dd063968a10eb60f7700e3ac82ed845a606d01ed9879627d9

    • SSDEEP

      768:PKsMqCXfVcWL/M9ZkiANIUKfYLDwUzc80gmq3oP/oDq:PKseTM9ZkiAP1r/0O8/o+

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • Renames multiple (84) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks