General
-
Target
eda603f4d469d017917f5d6affeb992fdf3b7971e49868ece8c38fb8e6f8b444.bin.sample.gz
-
Size
463KB
-
Sample
240228-ndxrmsac71
-
MD5
8816d23888fd7302320e0df92136abac
-
SHA1
a40903e237b93a48142ed4d706d01f3bcd918982
-
SHA256
b8ef280c81326bb7f9410c8e62ed654ff85d5da57c5b2fc35dab166059befe55
-
SHA512
b04aacee84db7cde0a10d7d12b9d73ae74ba1741603d983c9581edd74c227e3d43a2930f752101240f23d2287f55c712cc08493e01667c97f32f7b82882b874b
-
SSDEEP
12288:8A/xjYZK8Djx4nM7y43mmnOO8DQmbD18tqOiAinY+ejWp:b/iXjx4CmmnOOkF8tPinPeji
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
sample
-
Size
1.1MB
-
MD5
a031edc72ddea262780560405c0ea4ae
-
SHA1
7466b3a81dad69b01df5d4b1233734bc0454ced8
-
SHA256
eda603f4d469d017917f5d6affeb992fdf3b7971e49868ece8c38fb8e6f8b444
-
SHA512
608d6f490db60a8a0a9d25b5920bc1ced718a2de31a2293e799c79b15850e4a325f8dcdf004f95f09dad0093722d51cd83ee7bc33553a82a0cb87aff0004323f
-
SSDEEP
24576:xY6frxBDmkY+Jr0Iql2v4sx+uxtTy1eFR:LKuTvBwSd7R
Score10/10-
Detects Trigona ransomware
-
Adds Run key to start application
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Drops desktop.ini file(s)
-