General

  • Target

    05aae055be9d3b3fe46488ec9409302b5b029a25cbd379092dab5f50ea61b4db.exe

  • Size

    486KB

  • Sample

    250212-jbe2laskd1

  • MD5

    db0d857a85478d3271c404548574d88f

  • SHA1

    cd12263464ab15896db7f837d75b8865c9c84ab9

  • SHA256

    05aae055be9d3b3fe46488ec9409302b5b029a25cbd379092dab5f50ea61b4db

  • SHA512

    46956e7fa728a42c6159a97e51c87da8a14eb0ce6a11eca593c4cc0eeb19e8f6d6c9c029b6c2ffb2f008d622f7b6f2770d89836c005ccafdaedfd981d01c10a8

  • SSDEEP

    6144:/Tmapt6LFRvpdPYw709NU4VJX0xF2GdnReiqaNEbKf5xknZU5qqDLuZzYjTcOblx:rBtSRhdKfVcHqaN8Kf56qnuSPhl7dP

Malware Config

Targets

    • Target

      05aae055be9d3b3fe46488ec9409302b5b029a25cbd379092dab5f50ea61b4db.exe

    • Size

      486KB

    • MD5

      db0d857a85478d3271c404548574d88f

    • SHA1

      cd12263464ab15896db7f837d75b8865c9c84ab9

    • SHA256

      05aae055be9d3b3fe46488ec9409302b5b029a25cbd379092dab5f50ea61b4db

    • SHA512

      46956e7fa728a42c6159a97e51c87da8a14eb0ce6a11eca593c4cc0eeb19e8f6d6c9c029b6c2ffb2f008d622f7b6f2770d89836c005ccafdaedfd981d01c10a8

    • SSDEEP

      6144:/Tmapt6LFRvpdPYw709NU4VJX0xF2GdnReiqaNEbKf5xknZU5qqDLuZzYjTcOblx:rBtSRhdKfVcHqaN8Kf56qnuSPhl7dP

    • Trigona

      A ransomware first seen at the beginning of the 2022.

    • Trigona family

    • Downloads MZ/PE file

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks