General

  • Target

    nitro gen.exe

  • Size

    15.8MB

  • Sample

    240707-n66j9a1gjm

  • MD5

    d59bf9b2992822503563ff912fa2cfff

  • SHA1

    52fa6707ae1061191a6984dd660cceb380030bf9

  • SHA256

    9e238a2d2579ef463df4a3564cc72d47c1ac66520df1c8e4cfababa00512c93d

  • SHA512

    5160c03ee26abecc65e1d1840b752340ad2a1a1e8094012030b6a1d2785ee0add04760f48d4c6ea6f35277e0dce538a070b24d4e1a0b34193aa13d57c9bc5a93

  • SSDEEP

    196608:gsjoMmDsq5UQajwuLIcmtSJurErvI9pWjgtgZ3ZdahF0xH1AYQHxYhkiXtQGN+jz:no9DqUDtSJurEUWjagZew2/m6bjE9h6

Malware Config

Targets

    • Target

      nitro gen.exe

    • Size

      15.8MB

    • MD5

      d59bf9b2992822503563ff912fa2cfff

    • SHA1

      52fa6707ae1061191a6984dd660cceb380030bf9

    • SHA256

      9e238a2d2579ef463df4a3564cc72d47c1ac66520df1c8e4cfababa00512c93d

    • SHA512

      5160c03ee26abecc65e1d1840b752340ad2a1a1e8094012030b6a1d2785ee0add04760f48d4c6ea6f35277e0dce538a070b24d4e1a0b34193aa13d57c9bc5a93

    • SSDEEP

      196608:gsjoMmDsq5UQajwuLIcmtSJurErvI9pWjgtgZ3ZdahF0xH1AYQHxYhkiXtQGN+jz:no9DqUDtSJurEUWjagZew2/m6bjE9h6

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks