General

  • Target

    NitroRansomware.exe

  • Size

    61KB

  • Sample

    241026-pwsfbaslfy

  • MD5

    07e743c285d7f93f6eade3ef06f254af

  • SHA1

    0041dac01ef16644d29bfa52bbc07bb8650d1ab0

  • SHA256

    3648148140b969d6ff9c51898844311a7572815b1168a320eb924a3ebea6fc22

  • SHA512

    77ca7c4a5fca4b7e3e30e27fee2025d7fc4a6a0036633fff82ffde981a0bd04238134038a7b0615911f60614b44bbde3ecca32a4b767c8a420ab2e91317a12b6

  • SSDEEP

    768:0KsMqCXfVcWlzM9ZkiANIUndYLDwUzc80gmq3oP/oDF:0Kse1M9ZkiAPyr/0O8/oh

Malware Config

Targets

    • Target

      NitroRansomware.exe

    • Size

      61KB

    • MD5

      07e743c285d7f93f6eade3ef06f254af

    • SHA1

      0041dac01ef16644d29bfa52bbc07bb8650d1ab0

    • SHA256

      3648148140b969d6ff9c51898844311a7572815b1168a320eb924a3ebea6fc22

    • SHA512

      77ca7c4a5fca4b7e3e30e27fee2025d7fc4a6a0036633fff82ffde981a0bd04238134038a7b0615911f60614b44bbde3ecca32a4b767c8a420ab2e91317a12b6

    • SSDEEP

      768:0KsMqCXfVcWlzM9ZkiANIUndYLDwUzc80gmq3oP/oDF:0Kse1M9ZkiAPyr/0O8/oh

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • Nitro family

    • Renames multiple (93) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks