General

  • Target

    0626cf52bd697b73d774be87f7426aa86478dfa62a77a1c8eaeaf1dc6da3ed2c.exe

  • Size

    339KB

  • Sample

    250212-jas7tsskcv

  • MD5

    ee6ece14cd94c5a7ba9e47bca260c1f2

  • SHA1

    22f21ee79efc54e7e413d4af1ea043f8fb78de3a

  • SHA256

    0626cf52bd697b73d774be87f7426aa86478dfa62a77a1c8eaeaf1dc6da3ed2c

  • SHA512

    00e704abafc3d95c0d0c3c58aa752de006cce22c8aa87361cfc99feb77e44101e28b96470192aeea573406b8e5c80eba06af8940ca063c330faecda54c792202

  • SSDEEP

    6144:Jx2QdiglMPfD/XQ7kf3VYevUhhWAqqDLujvUkCLy9/Xg:JAQsgSDvaZhklqnujhiy9/Xg

Malware Config

Targets

    • Target

      0626cf52bd697b73d774be87f7426aa86478dfa62a77a1c8eaeaf1dc6da3ed2c.exe

    • Size

      339KB

    • MD5

      ee6ece14cd94c5a7ba9e47bca260c1f2

    • SHA1

      22f21ee79efc54e7e413d4af1ea043f8fb78de3a

    • SHA256

      0626cf52bd697b73d774be87f7426aa86478dfa62a77a1c8eaeaf1dc6da3ed2c

    • SHA512

      00e704abafc3d95c0d0c3c58aa752de006cce22c8aa87361cfc99feb77e44101e28b96470192aeea573406b8e5c80eba06af8940ca063c330faecda54c792202

    • SSDEEP

      6144:Jx2QdiglMPfD/XQ7kf3VYevUhhWAqqDLujvUkCLy9/Xg:JAQsgSDvaZhklqnujhiy9/Xg

    • Trigona

      A ransomware first seen at the beginning of the 2022.

    • Trigona family

    • Downloads MZ/PE file

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks