Nitrogen Dropping Cobalt Strike – A Combination of 'Chemical Elements'

May 2, 2025, 9:27 p.m.

Description

The Nitrogen ransomware group has expanded its operations from North America to Africa and Europe since September 2024. They utilize malvertising tactics, disguising malicious payloads as legitimate software like WinSCP. The group employs DLL sideloading for initial access, followed by Cobalt Strike for lateral movement and post-exploitation activities. The analysis reveals their use of a compromised host as a pivot system and attempts to cover tracks by clearing Windows logs. The investigation uncovered Cobalt Strike configurations through pattern analysis, byte-level XOR decryption, and custom YARA rules. Crash dump analysis using Windows Error Reporting artifacts and WinDBG proved crucial in identifying in-memory indicators of Cobalt Strike beacons and related structures.

Date

  • Created: May 2, 2025, 8:25 p.m.
  • Published: May 2, 2025, 8:25 p.m.
  • Modified: May 2, 2025, 9:27 p.m.

Indicators

  • fa3eca4d53a1b7c4cfcd14f642ed5f8a8a864f56a8a47acbf5cf11a6c5d2afa2
  • 278f22e258688a2afc1b6ac9f3aba61be0131b0de743c74db1607a7b6b934043

Attack Patterns

Additional Informations

  • Canada
  • United States of America