General
-
Target
26a74ace0b160831901b912f173137326019e731530e4ec283cbe44e3ccda165.exe
-
Size
1.8MB
-
Sample
250211-t97vdatmbv
-
MD5
c6c511ba966328c9497c8aa9264fb733
-
SHA1
2f760c24df7626929c48504402370d733de523c3
-
SHA256
26a74ace0b160831901b912f173137326019e731530e4ec283cbe44e3ccda165
-
SHA512
149f51eced34090808712ba202b63f6e610fc4e7ccb4d64f7d619ac8937abce9565cd986bfeaef9684d0a4e8766c80affc5fdf8f1dbd2c8996425390545d09cd
-
SSDEEP
24576:Jlt7h3gTTqGKw81ymxkamLsc7WXgIecEvitkj+udxP7:BhuTQxXwIecEvitZUxT
Behavioral task
behavioral1
Sample
26a74ace0b160831901b912f173137326019e731530e4ec283cbe44e3ccda165.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
26a74ace0b160831901b912f173137326019e731530e4ec283cbe44e3ccda165.exe
Resource
win10v2004-20250207-en
Malware Config
Targets
-
-
Target
26a74ace0b160831901b912f173137326019e731530e4ec283cbe44e3ccda165.exe
-
Size
1.8MB
-
MD5
c6c511ba966328c9497c8aa9264fb733
-
SHA1
2f760c24df7626929c48504402370d733de523c3
-
SHA256
26a74ace0b160831901b912f173137326019e731530e4ec283cbe44e3ccda165
-
SHA512
149f51eced34090808712ba202b63f6e610fc4e7ccb4d64f7d619ac8937abce9565cd986bfeaef9684d0a4e8766c80affc5fdf8f1dbd2c8996425390545d09cd
-
SSDEEP
24576:Jlt7h3gTTqGKw81ymxkamLsc7WXgIecEvitkj+udxP7:BhuTQxXwIecEvitZUxT
-
Detects Trigona ransomware
-
Trigona family
-
Downloads MZ/PE file
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1