General

  • Target

    f06974117c40911501007b835777d44b67171bae4ddb4b77a0842fe3a93bc3a6.exe

  • Size

    342KB

  • Sample

    250211-g46c5syphw

  • MD5

    12a0a4fad23eb3b9ee6a4e7baa6fa880

  • SHA1

    24580e35f24f7a1417ed26fe81432d5c5fc5cc30

  • SHA256

    f06974117c40911501007b835777d44b67171bae4ddb4b77a0842fe3a93bc3a6

  • SHA512

    684cc83a6aac254182da8e212a15fbc0e1b739dc36797e0de2e93cae382e5cf6f7ee25162ac41481a404cf97bd07feb027883249f51730380b01a244bfee53be

  • SSDEEP

    6144:+x2QdiglMFGfzIBeZO8Wf2cMRsCO/xZqqDLuz+4pQwVbTVCaF9QAepv:+AQsgScEydsCJqnuq4V9CaF9Uv

Malware Config

Targets

    • Target

      f06974117c40911501007b835777d44b67171bae4ddb4b77a0842fe3a93bc3a6.exe

    • Size

      342KB

    • MD5

      12a0a4fad23eb3b9ee6a4e7baa6fa880

    • SHA1

      24580e35f24f7a1417ed26fe81432d5c5fc5cc30

    • SHA256

      f06974117c40911501007b835777d44b67171bae4ddb4b77a0842fe3a93bc3a6

    • SHA512

      684cc83a6aac254182da8e212a15fbc0e1b739dc36797e0de2e93cae382e5cf6f7ee25162ac41481a404cf97bd07feb027883249f51730380b01a244bfee53be

    • SSDEEP

      6144:+x2QdiglMFGfzIBeZO8Wf2cMRsCO/xZqqDLuz+4pQwVbTVCaF9QAepv:+AQsgScEydsCJqnuq4V9CaF9Uv

    • Trigona

      A ransomware first seen at the beginning of the 2022.

    • Trigona family

    • Downloads MZ/PE file

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks