General

  • Target

    2024-10-10_eb0cee445f6662d2f475b3c2cde69e80_datper_trigona

  • Size

    342KB

  • Sample

    241010-hes7yswalr

  • MD5

    eb0cee445f6662d2f475b3c2cde69e80

  • SHA1

    32890896ecdf84ab235e3c127c9d0a5554270d3c

  • SHA256

    4cf87d7a4b119e528fb8d7c96bc17f319101c29101e22bba329314ee5f22331e

  • SHA512

    dad642d874ff34c33e49c3607ef1cd7818156f8dfe10bbe5209ba0ffb25a82d9d0f42f484ae8b3233e1311ce8ee0dc1b6a566aada226f5b6f45f33257cd44529

  • SSDEEP

    6144:Gx2QdiglMFGfzIBeZO8Wf2cMRlCO/xZqqDLuz+4pQoL27aR9:GAQsgScEydlCJqnuq4z2mR9

Malware Config

Targets

    • Target

      2024-10-10_eb0cee445f6662d2f475b3c2cde69e80_datper_trigona

    • Size

      342KB

    • MD5

      eb0cee445f6662d2f475b3c2cde69e80

    • SHA1

      32890896ecdf84ab235e3c127c9d0a5554270d3c

    • SHA256

      4cf87d7a4b119e528fb8d7c96bc17f319101c29101e22bba329314ee5f22331e

    • SHA512

      dad642d874ff34c33e49c3607ef1cd7818156f8dfe10bbe5209ba0ffb25a82d9d0f42f484ae8b3233e1311ce8ee0dc1b6a566aada226f5b6f45f33257cd44529

    • SSDEEP

      6144:Gx2QdiglMFGfzIBeZO8Wf2cMRlCO/xZqqDLuz+4pQoL27aR9:GAQsgScEydlCJqnuq4z2mR9

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks