General

  • Target

    eda603f4d469d017917f5d6affeb992fdf3b7971e49868ece8c38fb8e6f8b444.bin.sample.gz

  • Size

    463KB

  • Sample

    240228-ndxrmsac71

  • MD5

    8816d23888fd7302320e0df92136abac

  • SHA1

    a40903e237b93a48142ed4d706d01f3bcd918982

  • SHA256

    b8ef280c81326bb7f9410c8e62ed654ff85d5da57c5b2fc35dab166059befe55

  • SHA512

    b04aacee84db7cde0a10d7d12b9d73ae74ba1741603d983c9581edd74c227e3d43a2930f752101240f23d2287f55c712cc08493e01667c97f32f7b82882b874b

  • SSDEEP

    12288:8A/xjYZK8Djx4nM7y43mmnOO8DQmbD18tqOiAinY+ejWp:b/iXjx4CmmnOOkF8tPinPeji

Malware Config

Targets

    • Target

      sample

    • Size

      1.1MB

    • MD5

      a031edc72ddea262780560405c0ea4ae

    • SHA1

      7466b3a81dad69b01df5d4b1233734bc0454ced8

    • SHA256

      eda603f4d469d017917f5d6affeb992fdf3b7971e49868ece8c38fb8e6f8b444

    • SHA512

      608d6f490db60a8a0a9d25b5920bc1ced718a2de31a2293e799c79b15850e4a325f8dcdf004f95f09dad0093722d51cd83ee7bc33553a82a0cb87aff0004323f

    • SSDEEP

      24576:xY6frxBDmkY+Jr0Iql2v4sx+uxtTy1eFR:LKuTvBwSd7R

    • Detects Trigona ransomware

    • Trigona

      A ransomware first seen at the beginning of the 2022.

    • Adds Run key to start application

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops desktop.ini file(s)

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Network Service Discovery

1
T1046

Tasks