General

  • Target

    4aea0dad84263022b05d0da70ca3e50f9bc4375ffdd5fb1cb17e91446ac0da10.exe

  • Size

    1.8MB

  • Sample

    250212-gw7aga1jez

  • MD5

    d0291a6d151395076d7fb7ca9b798125

  • SHA1

    1653f7e784255f2bbc1c25b6d3bc4d59e7f04375

  • SHA256

    4aea0dad84263022b05d0da70ca3e50f9bc4375ffdd5fb1cb17e91446ac0da10

  • SHA512

    f624ee65028b349ce9f9a3133b1c89f01c51ba897de56bd4569d666556943b2de7b6d1afdc4ab041ef446dc17a2f381ce2c13b1aa1720380cbcbc807ce1e5183

  • SSDEEP

    24576:mlt7h3gTTqGKw81ymxkamLsc7WXgIecEvitkj+udsZWjm:uhuTQxXwIecEvitZUe

Malware Config

Targets

    • Target

      4aea0dad84263022b05d0da70ca3e50f9bc4375ffdd5fb1cb17e91446ac0da10.exe

    • Size

      1.8MB

    • MD5

      d0291a6d151395076d7fb7ca9b798125

    • SHA1

      1653f7e784255f2bbc1c25b6d3bc4d59e7f04375

    • SHA256

      4aea0dad84263022b05d0da70ca3e50f9bc4375ffdd5fb1cb17e91446ac0da10

    • SHA512

      f624ee65028b349ce9f9a3133b1c89f01c51ba897de56bd4569d666556943b2de7b6d1afdc4ab041ef446dc17a2f381ce2c13b1aa1720380cbcbc807ce1e5183

    • SSDEEP

      24576:mlt7h3gTTqGKw81ymxkamLsc7WXgIecEvitkj+udsZWjm:uhuTQxXwIecEvitZUe

    • Detects Trigona ransomware

    • Trigona

      A ransomware first seen at the beginning of the 2022.

    • Trigona family

    • Downloads MZ/PE file

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks