General

  • Target

    Nitro Gen.exe

  • Size

    6.8MB

  • Sample

    250103-ftxskszrh1

  • MD5

    db7698db99332e055fcb1ccd5eec6854

  • SHA1

    792553babcad121773c1b988e88b080d338e3d9d

  • SHA256

    b71b9447ada2657a217769c3af956f7be6a487550e8b3c602ac134d33bcb9a26

  • SHA512

    93b9cd664b2734bf8002230f1ddf9dd22df9957925825154fb8cb711bfe81ff4277a53a4b567bbbb497e419d71a1085bf3d015d1e2f1fa52ae79bda70ce92976

  • SSDEEP

    98304:0okkwN+MdA5wqSnWz8MMhJMjarJaon7JPzf+JiUCS3swhzqgez7DovaDJ1n6hB0L:0TV1vrB6ylnlPzf+JiJCsmFMvln6hqgK

Malware Config

Targets

    • Target

      Nitro Gen.exe

    • Size

      6.8MB

    • MD5

      db7698db99332e055fcb1ccd5eec6854

    • SHA1

      792553babcad121773c1b988e88b080d338e3d9d

    • SHA256

      b71b9447ada2657a217769c3af956f7be6a487550e8b3c602ac134d33bcb9a26

    • SHA512

      93b9cd664b2734bf8002230f1ddf9dd22df9957925825154fb8cb711bfe81ff4277a53a4b567bbbb497e419d71a1085bf3d015d1e2f1fa52ae79bda70ce92976

    • SSDEEP

      98304:0okkwN+MdA5wqSnWz8MMhJMjarJaon7JPzf+JiUCS3swhzqgez7DovaDJ1n6hB0L:0TV1vrB6ylnlPzf+JiJCsmFMvln6hqgK

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks