General
-
Target
checker nitro.rar
-
Size
15.6MB
-
Sample
250208-3p5zqaxrey
-
MD5
c73d1772a77559aff4de897ec7423050
-
SHA1
d58574339d8a56448486759c96bb3b49970e916d
-
SHA256
952267929c570c1d6550daee56969b9ac7a7e32c0fec499657eb9cd77e0bf332
-
SHA512
7445fcebb4d2e3a341798a4bab76b9ca41f724086d33ce857c6c9ddee3d45979a32efe072dca455f7c3b64d694f890b3cd3f9862b055a08a2fa3bcc60ab375ef
-
SSDEEP
393216:hf8cbBYYbZmgLEJxG0P8fRbOcEgrhi2XW4oUhumft/Q1:hUeZVmgIfjkhEgliGqUhumfC1
Behavioral task
behavioral1
Sample
checker nitro/checker de nitro.exe
Resource
win10v2004-20250207-en
Malware Config
Targets
-
-
Target
checker nitro/checker de nitro.exe
-
Size
15.7MB
-
MD5
829823ecaf20b2cadacfc2a2caad0dc0
-
SHA1
8ba0f8105fb37d1c0912cd743de0e18a89764252
-
SHA256
4d241c03dc903dd9330360e59b7dffcc3efb3a0fc4d916b35536d99d06de5c9c
-
SHA512
15d55a41043fb59b3e97b7ea63e7290c631630adccb63bfc9044c02733fe8ca126b1e7d40edcfb3b475de9fd18328ca4b478dadf08537edb4197e9a337f00395
-
SSDEEP
393216:Zt6WBACSY/+0ItJeluL6LIH20drLYRZjop:ZtVB1/vIMul3aZjop
-
Downloads MZ/PE file
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1