Resubmissions

21-01-2024 14:53

240121-r9a5asead2 10

30-06-2023 14:46

230630-r492faee4v 10

General

  • Target

    Trigona.exe

  • Size

    1.1MB

  • Sample

    240121-r9a5asead2

  • MD5

    2c31a750240788f924ef64a2fb4fdf3b

  • SHA1

    c9c6a7f911d16b49d8b838dca3683357b72c9d6d

  • SHA256

    b49bf3a4baf637e067a8db7360051eba39713b7958519b49f8e236b6014c8477

  • SHA512

    1e36c96110b793bfea2e65f6ff4c0e59a0a6b8f86395d7be6497be264954ab9b7c61d0adfa85dcef5ce69afe4b200b3ece82cbf089264f7d648eaaa53acbd50d

  • SSDEEP

    12288:XRYqX7pdDWExBDmkYhiPJSA0IqOO2vBwRns2MqnuY/gtTyb7:hY6frxBDmkY+Jr0Iql2v4sx+uxtTyn

Malware Config

Targets

    • Target

      Trigona.exe

    • Size

      1.1MB

    • MD5

      2c31a750240788f924ef64a2fb4fdf3b

    • SHA1

      c9c6a7f911d16b49d8b838dca3683357b72c9d6d

    • SHA256

      b49bf3a4baf637e067a8db7360051eba39713b7958519b49f8e236b6014c8477

    • SHA512

      1e36c96110b793bfea2e65f6ff4c0e59a0a6b8f86395d7be6497be264954ab9b7c61d0adfa85dcef5ce69afe4b200b3ece82cbf089264f7d648eaaa53acbd50d

    • SSDEEP

      12288:XRYqX7pdDWExBDmkYhiPJSA0IqOO2vBwRns2MqnuY/gtTyb7:hY6frxBDmkY+Jr0Iql2v4sx+uxtTyn

    • Detects Trigona ransomware

    • Trigona

      A ransomware first seen at the beginning of the 2022.

    • Adds Run key to start application

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops desktop.ini file(s)

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Network Service Discovery

1
T1046

Tasks