General

  • Target

    nitro generator!.zip

  • Size

    10.2MB

  • Sample

    240722-jxm94axdlr

  • MD5

    6700bd5d9fcecbb087e98199ccf44e1b

  • SHA1

    3cc480163565222380fff73eccc219add8510728

  • SHA256

    80c1704fc0738063222fd41ae186dc8afb918c4669a965b65a6d3c11f52257bd

  • SHA512

    39c087ec8d74ce1dd5713639e33e55a3aa5380efaa1a09534d56a1a6e65d587eb813eb69afd0a3751ef2f7cd66d6d5ca83877282b6b2a21904e5c0bcc85b8f09

  • SSDEEP

    196608:z4MD3rch1HR5ESM6q76461c1Qu6WCTJbG2VJ9PVDiwURrLdXJQ+pDpJR3azyCuyV:n0vFMdn1N6SEPVWPLplJRqX9V

Malware Config

Targets

    • Target

      nitrogenerator!.exe

    • Size

      20.3MB

    • MD5

      3fba0c94287e0daef803f4ab349fdc0a

    • SHA1

      c1e9e2e073e45064d7ad9fab2d53fa7265b745cb

    • SHA256

      d0514ca5d198d6510f7ddfa2f4421ec53b69d59bdbab41932aec6c0312dfd15f

    • SHA512

      0aa72a7ddc182a9a60a735cd5220582281c61444b9add461f41bb71dcafeeaf278c4054e7bc6bcd9f108e6f84a97fff71e7513a3248e00d0d098cf42b3148b55

    • SSDEEP

      196608:H5lPA+Jb3tQk5tOeNvX+wfm/pf+xfdkRGZWKsnwrIWOzW0DaqkH:ZC+7v5tRvX+9/pWFGRsBsnwrIWeRaDH

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks