Analysis
-
max time kernel
141s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
18-04-2023 10:19
Behavioral task
behavioral1
Sample
fb128dbd4e945574a2795c2089340467fcf61bb3232cc0886df98d86ff328d1b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
fb128dbd4e945574a2795c2089340467fcf61bb3232cc0886df98d86ff328d1b.exe
Resource
win10v2004-20230220-en
General
-
Target
fb128dbd4e945574a2795c2089340467fcf61bb3232cc0886df98d86ff328d1b.exe
-
Size
1.1MB
-
MD5
530967fb3b7d9427552e4ac181a37b9a
-
SHA1
41bcf469661ab9609a0d181953c2f8ffb75bb483
-
SHA256
fb128dbd4e945574a2795c2089340467fcf61bb3232cc0886df98d86ff328d1b
-
SHA512
b81a447a994839a6858bab10eaa2c26aabaf3f73e7ffd2c70d27dfde5f11b35f5d153362277c046d47bcf9dc2d2b7c92d5805e89e633f9326306071abb213afa
-
SSDEEP
24576:15swNmjEoujhn3wVPWJFwEQWV+u7h62TL:HouNVOEbcah6qL
Malware Config
Signatures
-
Detects Trigona ransomware 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1212-54-0x0000000000400000-0x0000000000526000-memory.dmp family_trigona behavioral1/memory/1212-55-0x0000000000400000-0x0000000000526000-memory.dmp family_trigona behavioral1/memory/1212-56-0x0000000000400000-0x0000000000526000-memory.dmp family_trigona -
Trigona
A ransomware first seen at the beginning of the 2022.