General

  • Target

    88863861e03c74eb9b3015e95df10475_JaffaCakes118

  • Size

    60KB

  • Sample

    241102-3x67rayglg

  • MD5

    88863861e03c74eb9b3015e95df10475

  • SHA1

    e4b6a008352c6cf89499d484da3646e105a5e3bc

  • SHA256

    3b4f7181d275f3a1551fb024f6d054f01a565291d7739741c4278a0d26e00ebd

  • SHA512

    61c1b78c24bc46469f3d68160225ba24d175a334319481a16b57e19ead92d8cee105ea5e41e061921e50f59e742991d2ba213f12222a1c511ae471135d77a9ca

  • SSDEEP

    768:TOucKn7n1JGDtANIUD75SGLDwUzc80gmq3oP/oDl:TO2GDtAPD/r/0O8/oh

Malware Config

Targets

    • Target

      88863861e03c74eb9b3015e95df10475_JaffaCakes118

    • Size

      60KB

    • MD5

      88863861e03c74eb9b3015e95df10475

    • SHA1

      e4b6a008352c6cf89499d484da3646e105a5e3bc

    • SHA256

      3b4f7181d275f3a1551fb024f6d054f01a565291d7739741c4278a0d26e00ebd

    • SHA512

      61c1b78c24bc46469f3d68160225ba24d175a334319481a16b57e19ead92d8cee105ea5e41e061921e50f59e742991d2ba213f12222a1c511ae471135d77a9ca

    • SSDEEP

      768:TOucKn7n1JGDtANIUD75SGLDwUzc80gmq3oP/oDl:TO2GDtAPD/r/0O8/oh

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • Nitro family

    • Renames multiple (96) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks