General

  • Target

    983590ffbdf013bcf16980e7597742def0e06ef3c2d6e2bb71918f7e38b33339.exe

  • Size

    338KB

  • Sample

    250211-tkr3masjf1

  • MD5

    6358d925c5393bf4f6347369c88a1280

  • SHA1

    b6f3556c575868ff5c5fb824fbf067595486ff90

  • SHA256

    983590ffbdf013bcf16980e7597742def0e06ef3c2d6e2bb71918f7e38b33339

  • SHA512

    be0f6c9e26626ad26eaea9c63814e31cc7d37dbaae1ce76400d558bc7bc67b53bd0157dda8324307f22fb702b81cf41003ea10b5251535ddc6dac9fe3f8efefb

  • SSDEEP

    6144:tx2QdiglMFvsgR3M20JAEpugtfnqqDLuP+nhuGZwjTlPYh:tAQsgSygNb21JfqqnuGnlZwjTuh

Malware Config

Targets

    • Target

      983590ffbdf013bcf16980e7597742def0e06ef3c2d6e2bb71918f7e38b33339.exe

    • Size

      338KB

    • MD5

      6358d925c5393bf4f6347369c88a1280

    • SHA1

      b6f3556c575868ff5c5fb824fbf067595486ff90

    • SHA256

      983590ffbdf013bcf16980e7597742def0e06ef3c2d6e2bb71918f7e38b33339

    • SHA512

      be0f6c9e26626ad26eaea9c63814e31cc7d37dbaae1ce76400d558bc7bc67b53bd0157dda8324307f22fb702b81cf41003ea10b5251535ddc6dac9fe3f8efefb

    • SSDEEP

      6144:tx2QdiglMFvsgR3M20JAEpugtfnqqDLuP+nhuGZwjTlPYh:tAQsgSygNb21JfqqnuGnlZwjTuh

    • Trigona

      A ransomware first seen at the beginning of the 2022.

    • Trigona family

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks