General

  • Target

    Gen_Nitro_Free.exe

  • Size

    7.5MB

  • Sample

    241104-prlrzazfpq

  • MD5

    ad9dca7cf54087290ed31c1e2dae76f1

  • SHA1

    488e2800a5d166979aae7d18779a60105634dfe4

  • SHA256

    52c6d6d7620dcf64c37600724aee410364596ba793d306755a3aff8534e2623d

  • SHA512

    8637a16c05b856858da57694c6d859dd66928369771b017cea514239fb71c37c8914b55303a2ada1e0b43237fb06083f32013dd4efc6cbad690876b57835d109

  • SSDEEP

    196608:iwgFawfI9jUC2gYBYv3vbW5+iITm1U6fp:gFJIH2gYBgDW4TOzR

Malware Config

Targets

    • Target

      Gen_Nitro_Free.exe

    • Size

      7.5MB

    • MD5

      ad9dca7cf54087290ed31c1e2dae76f1

    • SHA1

      488e2800a5d166979aae7d18779a60105634dfe4

    • SHA256

      52c6d6d7620dcf64c37600724aee410364596ba793d306755a3aff8534e2623d

    • SHA512

      8637a16c05b856858da57694c6d859dd66928369771b017cea514239fb71c37c8914b55303a2ada1e0b43237fb06083f32013dd4efc6cbad690876b57835d109

    • SSDEEP

      196608:iwgFawfI9jUC2gYBYv3vbW5+iITm1U6fp:gFJIH2gYBgDW4TOzR

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks