General
-
Target
PrimeNitro.exe
-
Size
6.7MB
-
Sample
250204-wxj9nawkat
-
MD5
fdca2e936f85cf95dfad487c446c2fd7
-
SHA1
6150c5943ebf062955964a4c3302388d46e70c6d
-
SHA256
bbed570069f6f4b9cf95a21365658060474320b03a49753af9bb423423de41ad
-
SHA512
f42322f9f5267a31de8c118f81ada0bb4e4d7bb7ce0a60cf7d3be3c6efe2cc90a50898ca20960e01f3f71e13c9dfdd9817f1d16cd5d7205de0916df11634b6b4
-
SSDEEP
196608:QLF+0eN/FJMIDJf0gsAGK5SEQR4kzdv8Yq:Z/Fqyf0gsfN4kp0v
Behavioral task
behavioral1
Sample
PrimeNitro.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral2
Sample
�}��g}e.pyc
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
PrimeNitro.exe
-
Size
6.7MB
-
MD5
fdca2e936f85cf95dfad487c446c2fd7
-
SHA1
6150c5943ebf062955964a4c3302388d46e70c6d
-
SHA256
bbed570069f6f4b9cf95a21365658060474320b03a49753af9bb423423de41ad
-
SHA512
f42322f9f5267a31de8c118f81ada0bb4e4d7bb7ce0a60cf7d3be3c6efe2cc90a50898ca20960e01f3f71e13c9dfdd9817f1d16cd5d7205de0916df11634b6b4
-
SSDEEP
196608:QLF+0eN/FJMIDJf0gsAGK5SEQR4kzdv8Yq:Z/Fqyf0gsfN4kp0v
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
�}��g}e.pyc
-
Size
857B
-
MD5
f519e637d52de898c56067179dcd3951
-
SHA1
028602738bdcf6857b7097dbab7a4310937ea10d
-
SHA256
afd6e2f6f534f94693263e27be03238d407a7a3438fe276e9eb3ab6c943cda72
-
SHA512
787ea90d8d8af3b9a1982aa83565b049304ab9a4ec65e17a0405c074e3edb50d186f738730897582128e6b81286ab30d939ea40f85e4d810a0b40b5c6231f57d
Score1/10 -
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3