General

  • Target

    dfa7a2d95a5fe8820b0bc61c4d687da804446c222dd30e4b7c9f379c531ce60f

  • Size

    108KB

  • Sample

    241103-zqg3havdlq

  • MD5

    72686c1e9b00ec1e980bc2eb58677ca1

  • SHA1

    93636eb6cdab3fbf0ddb212077ea1484c094f70b

  • SHA256

    dfa7a2d95a5fe8820b0bc61c4d687da804446c222dd30e4b7c9f379c531ce60f

  • SHA512

    a522b0258cae030f52bb9ff4c334d5c793807f0041adbb87e98c14e7f1b954a8dd9c833ce62328df30fdeb0c197eebb2ae375b821e63f64f227701d041c290a2

  • SSDEEP

    1536:fO2KDNAPWr/0O8/obeGuXZlZXWYvsR+79dj5V4huWoa:RKDNgWN8/obpR+Hj5ihuPa

Malware Config

Targets

    • Target

      dfa7a2d95a5fe8820b0bc61c4d687da804446c222dd30e4b7c9f379c531ce60f

    • Size

      108KB

    • MD5

      72686c1e9b00ec1e980bc2eb58677ca1

    • SHA1

      93636eb6cdab3fbf0ddb212077ea1484c094f70b

    • SHA256

      dfa7a2d95a5fe8820b0bc61c4d687da804446c222dd30e4b7c9f379c531ce60f

    • SHA512

      a522b0258cae030f52bb9ff4c334d5c793807f0041adbb87e98c14e7f1b954a8dd9c833ce62328df30fdeb0c197eebb2ae375b821e63f64f227701d041c290a2

    • SSDEEP

      1536:fO2KDNAPWr/0O8/obeGuXZlZXWYvsR+79dj5V4huWoa:RKDNgWN8/obpR+Hj5ihuPa

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • Nitro family

    • Renames multiple (83) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks