General

  • Target

    Nitrogen.zip

  • Size

    450KB

  • Sample

    250404-bwrxwsxwh1

  • MD5

    280b1bfe4e51f4bd2dd327b683497532

  • SHA1

    518ebf1b067ff5184a8049c8219cf0957850c01e

  • SHA256

    e038854494c067f921f7df47f3149c782779a26d23581d8c3c87d4c5e2270847

  • SHA512

    2eced74052d7a884043c76b6256ce6abade4d27fd9e69c19c3f5dd967d16c63928c19c89093ab44f1d10a4c458c9643238e95c01fb8955aceae0f7b75042423b

  • SSDEEP

    12288:gcx2q74v6drMyCDtKnysl/4cZwptJStZ84rFrjy0I+SI:FAq7korM3t8xd4cUJSt2+9xDSI

Malware Config

Extracted

Path

C:\Recovery\readme.txt

Ransom Note
Nitrogen welcome you! Take this seriously, this is not a joke! Your company network are encrypted and your data has been stolen and downloaded to our servers. Ignoring this message will result in all your data being published on our blog: http://nitrogenczslprh3xyw6lh5xyjvmsz7ciljoqxxknd7uymkfetfhgvqd.onion This problem can be solved: 1. Your network and data can will be restored. 2. Your data is stolen and stored on our server, after receive payment it will be completely removed from our servers. 3. No one is aware about the data leak from your company except you. If you believe you can handle without us and decrypting your servers and data using some IT Solution from third-party specialists? They will only make significant damage to all of your data; every encrypted file will be corrupted forever. Only our Decryption Tool will make decryption guaranteed. Don't go to recovery companies, they are essentially just middlemen who will make money off you. If you decide not to negotiate with us and find another solution. We will make huge damage to your business by using all of our experience to make your partners, clients, employees and whoever cooperates with your company know about this accident and stop any partnership with you. As a result, You will suffer great losses and you will must to pay a penalty to the state and to compensate for lawsuits against your company. Also in case of disclosure of information about a cyber attack and theft of confidential data of your company your assets may fall and it will cost you several times more expensive instead agreeing with us. Want to go to Government for protection? Your address them for help will only make the situation worse. They will try to prevent you from negotiating with us, because the negotiations will make them look weak and incompetent. After the incident report is handed over to the government department, you receive get a penalty for this accident and leak personal data. This will be a huge amount, you can read more about the GDRP legislation: https://en.wikipedia.org/wiki/General_Data_Protection_Regulation/ In this situation you will not be winners anyway. So lets get straight to the point. After we receive your payment you will get the followings: -Decryption tool for all your systems. -Detailed penetration overview with main kill chain and security recommendations -Proof that we have securely deleted your data -Our word that we will not perform attacks on you in the future. Now, in order to start negotiations, you need to do the following: -Install Tor Browser from https://www.torproject.org/download/ -Use Tor Browser open: xqsdbtrtmufdyiqnkrkvosec4gqappf2egcptzqppjtqdevsoadakyqd.onion/quick-access/5RyUpUB1erpS21m9la/chats/ftornxmnsbgu -If you have any problems accessing the onion site, use the qTox app(https://github.com/qTox/qTox/releases/download/v1.17.6/setup-qtox-x86_64-release.exe) to contact us. ToxID: 088B7708F2C1557B6023B1102FFC5C36C023FF4883CB073F26A33B73832C9268993ED58B817E If you do not contact us within 3 days, we will begin publishing your data on all social networks.
URLs

http://nitrogenczslprh3xyw6lh5xyjvmsz7ciljoqxxknd7uymkfetfhgvqd.onion

http://xqsdbtrtmufdyiqnkrkvosec4gqappf2egcptzqppjtqdevsoadakyqd.onion/quick-access/5RyUpUB1erpS21m9la/chats/ftornxmnsbgu

Targets

    • Target

      Nitrogen.exe

    • Size

      1.2MB

    • MD5

      834d94cf35d9417aa93a5cb350a756e9

    • SHA1

      5fbe4fef61314da6663b17b9120af20db0a2866f

    • SHA256

      0db5c55ef52e89401a668f59bf4f69391f4632447c51483bb64749d7f2123916

    • SHA512

      d986d4af87088a1599fd2c5eb8bc19594509bd422c1f462788430f6b636c75b9e578889c7322b841d2f0cd77c789c243dc979608f213f9b255a439f11ac70728

    • SSDEEP

      24576:Ye5MhKjQ6Vrn/hdGNGVb9e5DFzvwPxoAgCxp59p:YeEl6Vrn/HQGVb9e5DFzvExVgC

    • Renames multiple (1292) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks