General

  • Target

    Nitro Lifetime Method.txt

  • Size

    3KB

  • Sample

    240913-bml1aawcrk

  • MD5

    39356142ca258828ac8b547eb9ffc18f

  • SHA1

    3b3ad91d1b4c31d24289a2174a45ece663ddf5b2

  • SHA256

    d2a95df36aa60c1581c4dde74ac7ac43cb88a499f7f5eca8e964a93a6fbb00f3

  • SHA512

    046c296691f28319cfcbeca51be1f4a4eaad21586d85368fb0703b85da46d7be8c6d1224c23802afe1e095bb7e973a626621856fe43b13ad81841032506c8ba7

Malware Config

Targets

    • Target

      Nitro Lifetime Method.txt

    • Size

      3KB

    • MD5

      39356142ca258828ac8b547eb9ffc18f

    • SHA1

      3b3ad91d1b4c31d24289a2174a45ece663ddf5b2

    • SHA256

      d2a95df36aa60c1581c4dde74ac7ac43cb88a499f7f5eca8e964a93a6fbb00f3

    • SHA512

      046c296691f28319cfcbeca51be1f4a4eaad21586d85368fb0703b85da46d7be8c6d1224c23802afe1e095bb7e973a626621856fe43b13ad81841032506c8ba7

    • BadRabbit

      Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.

    • CryptoLocker

      Ransomware family with multiple variants.

    • Mimikatz

      mimikatz is an open source tool to dump credentials on Windows.

    • mimikatz is an open source tool to dump credentials on Windows

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks