General

  • Target

    2024-11-23_9f877949b8cbbb3adfe07fd4411b9f26_trigona

  • Size

    1.7MB

  • Sample

    241123-g74nqawqdk

  • MD5

    9f877949b8cbbb3adfe07fd4411b9f26

  • SHA1

    c1c9008b4be855583df0f04204443262a3fbc8ab

  • SHA256

    713392f009bc133f24b3271379a4ac147e1a7782b6a1ac957c1fda69d676b550

  • SHA512

    3c7820ea13f3f5b25052fb8976e08e2450ac8d58fa5e928f5e288fec990b2ceb43b3390c5c9c96ab9c08a0ab8390961becbd6001d6431382a21fff8b982f67db

  • SSDEEP

    24576:GRbXhiB9TYLQK6RdJxXBhGfl8XCYiXODD+usxbc/4JcZ:MhQT4AYYiXODSbL+

Malware Config

Targets

    • Target

      2024-11-23_9f877949b8cbbb3adfe07fd4411b9f26_trigona

    • Size

      1.7MB

    • MD5

      9f877949b8cbbb3adfe07fd4411b9f26

    • SHA1

      c1c9008b4be855583df0f04204443262a3fbc8ab

    • SHA256

      713392f009bc133f24b3271379a4ac147e1a7782b6a1ac957c1fda69d676b550

    • SHA512

      3c7820ea13f3f5b25052fb8976e08e2450ac8d58fa5e928f5e288fec990b2ceb43b3390c5c9c96ab9c08a0ab8390961becbd6001d6431382a21fff8b982f67db

    • SSDEEP

      24576:GRbXhiB9TYLQK6RdJxXBhGfl8XCYiXODD+usxbc/4JcZ:MhQT4AYYiXODSbL+

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks