General
-
Target
Nitrogen X.exe
-
Size
81.5MB
-
Sample
240819-sq8rwsvfkr
-
MD5
fbf95bce348da886b0c0adee89fce7e8
-
SHA1
f6496dd70c32ca34721bf6c8bd143145465c2452
-
SHA256
10b71c258daeaffb0e9bedc06fd21655b98005ffa78e8d3d0e98a99077046385
-
SHA512
2362a0f3affea9ce8a72e824915eb32c6db019647e02c535f62d581d5382c998d0e081d2219192328533f0ac8517c4bf3e6edcbd18d259415372c83beccd1d9f
-
SSDEEP
1572864:4vxZQglDWK7vaSk8IpG7V+VPhqYdfCE7jlgJiYgj+h58sMwW9RhVcJX:4vxZxhHeSkB05awcfHeL5i9RY
Behavioral task
behavioral1
Sample
Nitrogen X.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Nitrogen X.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
Nitrogen X.exe
-
Size
81.5MB
-
MD5
fbf95bce348da886b0c0adee89fce7e8
-
SHA1
f6496dd70c32ca34721bf6c8bd143145465c2452
-
SHA256
10b71c258daeaffb0e9bedc06fd21655b98005ffa78e8d3d0e98a99077046385
-
SHA512
2362a0f3affea9ce8a72e824915eb32c6db019647e02c535f62d581d5382c998d0e081d2219192328533f0ac8517c4bf3e6edcbd18d259415372c83beccd1d9f
-
SSDEEP
1572864:4vxZQglDWK7vaSk8IpG7V+VPhqYdfCE7jlgJiYgj+h58sMwW9RhVcJX:4vxZxhHeSkB05awcfHeL5i9RY
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1