General

  • Target

    85f4088286ac1eedc94ad9dc6465e9e4b89d1cde3012f9949450fcc9f2b60431.bin.exe

  • Size

    342KB

  • Sample

    240121-rv9z3seaa4

  • MD5

    c28b33f7365f9dc72cc291d13458f334

  • SHA1

    b4ad79b2800a6540f1c460ce6220a4ebb551a18b

  • SHA256

    85f4088286ac1eedc94ad9dc6465e9e4b89d1cde3012f9949450fcc9f2b60431

  • SHA512

    3bb9e234da571093c05e21b4ffdfa7ceb9d6f95a33a07e39260a974fdc19dfc7ba72e7f9a579ec45585857d5d543ff99a535b479cf77629858c3cfa1c824e46f

  • SSDEEP

    6144:Gx2QdiglMFGfzIBeZO8Wf2cMRsCO/xZqqDLuz+4pQoL27aR9:GAQsgScEydsCJqnuq4z2mR9

Malware Config

Targets

    • Target

      85f4088286ac1eedc94ad9dc6465e9e4b89d1cde3012f9949450fcc9f2b60431.bin.exe

    • Size

      342KB

    • MD5

      c28b33f7365f9dc72cc291d13458f334

    • SHA1

      b4ad79b2800a6540f1c460ce6220a4ebb551a18b

    • SHA256

      85f4088286ac1eedc94ad9dc6465e9e4b89d1cde3012f9949450fcc9f2b60431

    • SHA512

      3bb9e234da571093c05e21b4ffdfa7ceb9d6f95a33a07e39260a974fdc19dfc7ba72e7f9a579ec45585857d5d543ff99a535b479cf77629858c3cfa1c824e46f

    • SSDEEP

      6144:Gx2QdiglMFGfzIBeZO8Wf2cMRsCO/xZqqDLuz+4pQoL27aR9:GAQsgScEydsCJqnuq4z2mR9

    • Trigona

      A ransomware first seen at the beginning of the 2022.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks