Overview
overview
7Static
static
3NitroGener...in.rar
windows10-2004-x64
7NitroGener...in.rar
windows11-21h2-x64
1NitroGener...es.txt
windows10-2004-x64
1NitroGener...es.txt
windows11-21h2-x64
3NitroGener...ol.exe
windows10-2004-x64
7NitroGener...ol.exe
windows11-21h2-x64
7NitroTool.pyc
windows10-2004-x64
3NitroTool.pyc
windows11-21h2-x64
3NitroGener...ool.py
windows10-2004-x64
3NitroGener...ool.py
windows11-21h2-x64
3NitroGener...DME.md
windows10-2004-x64
3NitroGener...DME.md
windows11-21h2-x64
3Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
20/11/2024, 14:55
Behavioral task
behavioral1
Sample
NitroGenerator-Checker-main.rar
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
NitroGenerator-Checker-main.rar
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
NitroGenerator-Checker-main/Nitro Codes.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
NitroGenerator-Checker-main/Nitro Codes.txt
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
NitroGenerator-Checker-main/NitroTool.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
NitroGenerator-Checker-main/NitroTool.exe
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
NitroTool.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
NitroTool.pyc
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
NitroGenerator-Checker-main/NitroTool.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral10
Sample
NitroGenerator-Checker-main/NitroTool.py
Resource
win11-20241023-en
Behavioral task
behavioral11
Sample
NitroGenerator-Checker-main/README.md
Resource
win10v2004-20241007-en
Behavioral task
behavioral12
Sample
NitroGenerator-Checker-main/README.md
Resource
win11-20241007-en
General
-
Target
NitroGenerator-Checker-main.rar
-
Size
8.3MB
-
MD5
cecae080f9a2005a9afa0f96bce6f2e7
-
SHA1
93f5154b216c4a862e6a4e6ea81f64a7a06dc9ab
-
SHA256
592abf8a884553d34b1a4b27ce12d51ad8dcaa2c35db7b004e37fcc642185405
-
SHA512
0e5720b892ff1abfdae0c42fc970e94b5c307ea43931b9a6598cc7b12fe5e1f12a27c2c88c9b95567d77e017feeb30d84abd5c101bf2e14119109e666ed94866
-
SSDEEP
196608:a9Rza1/MMedj8DhtneFHt9LOHgjN0CWKHzGB/7Vz7VZ5C+v:gi/MM+j8DhqHtNagjkWk7V35C+v
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 4400 7zFM.exe Token: 35 4400 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4400 7zFM.exe