General
-
Target
4aea0dad84263022b05d0da70ca3e50f9bc4375ffdd5fb1cb17e91446ac0da10.exe
-
Size
1.8MB
-
Sample
250212-gw7aga1jez
-
MD5
d0291a6d151395076d7fb7ca9b798125
-
SHA1
1653f7e784255f2bbc1c25b6d3bc4d59e7f04375
-
SHA256
4aea0dad84263022b05d0da70ca3e50f9bc4375ffdd5fb1cb17e91446ac0da10
-
SHA512
f624ee65028b349ce9f9a3133b1c89f01c51ba897de56bd4569d666556943b2de7b6d1afdc4ab041ef446dc17a2f381ce2c13b1aa1720380cbcbc807ce1e5183
-
SSDEEP
24576:mlt7h3gTTqGKw81ymxkamLsc7WXgIecEvitkj+udsZWjm:uhuTQxXwIecEvitZUe
Behavioral task
behavioral1
Sample
4aea0dad84263022b05d0da70ca3e50f9bc4375ffdd5fb1cb17e91446ac0da10.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4aea0dad84263022b05d0da70ca3e50f9bc4375ffdd5fb1cb17e91446ac0da10.exe
Resource
win10v2004-20250211-en
Malware Config
Targets
-
-
Target
4aea0dad84263022b05d0da70ca3e50f9bc4375ffdd5fb1cb17e91446ac0da10.exe
-
Size
1.8MB
-
MD5
d0291a6d151395076d7fb7ca9b798125
-
SHA1
1653f7e784255f2bbc1c25b6d3bc4d59e7f04375
-
SHA256
4aea0dad84263022b05d0da70ca3e50f9bc4375ffdd5fb1cb17e91446ac0da10
-
SHA512
f624ee65028b349ce9f9a3133b1c89f01c51ba897de56bd4569d666556943b2de7b6d1afdc4ab041ef446dc17a2f381ce2c13b1aa1720380cbcbc807ce1e5183
-
SSDEEP
24576:mlt7h3gTTqGKw81ymxkamLsc7WXgIecEvitkj+udsZWjm:uhuTQxXwIecEvitZUe
-
Detects Trigona ransomware
-
Trigona family
-
Downloads MZ/PE file
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1