General
-
Target
NitroGenerator.exe
-
Size
14.6MB
-
Sample
240705-mkveeswgqr
-
MD5
9be718b54751c32bd3c45de8fc5a3f8b
-
SHA1
d211f4b16c560a74efbaf311d4e7ffa6921b75ee
-
SHA256
7d1e94147b1cb92a59e80204e6297c87fc1bdc7618e173cfb3074561bdfe7213
-
SHA512
7057e3808a612e64a7eb7f70657e42cd3fae6d874c2f7b50eb7167472059f1fd40258a42f4d5b6e2b01c6c551946461c1f745a4cb249a2d27157d68d63f3e540
-
SSDEEP
393216:HFEkZQMidQuslSq99oWOv+9fgdigq8Evx:HFhQ3dQuSDorvSYdTEv
Behavioral task
behavioral1
Sample
NitroGenerator.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
NitroGenerator.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
creal.pyc
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
creal.pyc
Resource
win10v2004-20240704-en
Malware Config
Targets
-
-
Target
NitroGenerator.exe
-
Size
14.6MB
-
MD5
9be718b54751c32bd3c45de8fc5a3f8b
-
SHA1
d211f4b16c560a74efbaf311d4e7ffa6921b75ee
-
SHA256
7d1e94147b1cb92a59e80204e6297c87fc1bdc7618e173cfb3074561bdfe7213
-
SHA512
7057e3808a612e64a7eb7f70657e42cd3fae6d874c2f7b50eb7167472059f1fd40258a42f4d5b6e2b01c6c551946461c1f745a4cb249a2d27157d68d63f3e540
-
SSDEEP
393216:HFEkZQMidQuslSq99oWOv+9fgdigq8Evx:HFhQ3dQuSDorvSYdTEv
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
creal.pyc
-
Size
32KB
-
MD5
0a0ef875b8d00cf5851e317112ac9c6d
-
SHA1
2f18340880110a821f8a9d7048d69ebce531f5d8
-
SHA256
f2350af9c5f10dd15936d9e7185301911e2cf8859fe68aa57642ecb4b586f8c7
-
SHA512
f529fa38b5cb445d3eb1c1b7afc3f091071993b1a097078eebeed3248f27938b2d8ddecd190caccaf0f752552be709fefa87fbe8e148e7b3a4039d3345448744
-
SSDEEP
768:L8Dnri2VsfNEiyAuAfKFMrRtfqtvEwS7bnjerAroaHDsIAvN8YC06X:Ijrwe3aKFcfDwS7fOPviYD6X
Score3/10 -