Trigona is a newly observed ransomware strain that security researchers first noted in Oct 2022 and was highly active in Dec 2022 with at least 15 victims across multiple industries. The operation uses HTML Application ransom notes with embedded JavaScript containing unique IDs, a Tor negotiation portal, and contact emails, and it employs a mix of legitimate tools and custom scripts to deploy, persist, and encrypt data. #Trigona #CryLock
Keypoints
- Trigona emerged in late 2022 and impacted organizations across manufacturing, finance, construction, agriculture, marketing, and high-tech sectors.
- Ransom notes are delivered as HTML Applications with embedded JavaScript containing a CID and VID, plus a Tor portal and contact emails.
- The ransomware binary svhost.exe uses TDCP_rijndael (Delphi AES) to encrypt files and appends the ._locked extension, with registry-based persistence.
- Initial access, reconnaissance, lateral movement via remote monitoring software (Splashtop), and new user creation are observed attack steps.
- Unit 42 tracked victim IDs in notes and identified at least 15 December 2022 victims; a surface web leak site appeared with long countdowns and pressure tactics.
- There are notable similarities to CryLock, including HTML Application ransom notes, AES encryption, and overlapping TTPs and an email address tied to CryLock discussions.
- Tools and scripts include NetScan for discovery, Start.bat, Turnoff.bat, Newuser.bat, Mimikatz (DC2/DC4), and UPX-packed binaries; attackers also abuse legitimate software like Splashtop and Advanced Port Scanner.
MITRE Techniques
- [T1072] Software Deployment Tools – Splashtop is used to move laterally and transfer malware between compromised hosts in the victim’s environment. “Trigona operators use Splashtop to move laterally and transfer malware between compromised hosts in the victim’s environment.”
- [T1546.008] Accessibility Features – DC4.exe creates a “Sticky Keys backdoor” that allows for creation of a command prompt with NT AUTHORITYSYSTEM privileges. “DC4.exe… creates a batch script that, when executed, creates a “Sticky Keys backdoor” that allows for the creation of a command prompt with NT AUTHORITYSYSTEM privileges.”
- [T1136] Create Account – Newuser.bat creates a new user with the username fredla and the password Qw123456. “Newuser.bat creates a new user with the name fredla and the password Qw123456.”
- [T1098] Account Manipulation – Trigona operators compromise administrator accounts and use them to conduct malicious activities, such as executing NetScan. “compromise administrator accounts and use them to conduct malicious activities, such as executing NetScan.”
- [T1027] Obfuscated Files or Information – DC2.exe and DC4.exe are UPX-packed to evade static detection. “use UPX to pack DC2.exe and DC4.exe to avoid static signature detection.”
- [T1112] Modify Registry – DC4.exe modifies the Windows registry to allow remote desktop connections. “modifies the Windows registry to allow remote desktop connections.”
- [T1562.004] Disable/Modify System Firewall – DC4.exe opens an RDP port in the firewall to permit remote access. “opens up an Remote Desktop Protocol (RDP) port in the firewall with DC4.exe.”
- [T1070.001] Clear Windows Event Logs – Turnoff.bat is used to clear event logs via wevtutil cl. “Turnoff.bat to clear event logs via wevtutil cl.”
- [T1070.004] File Deletion – Attackers delete files such as mim.exe, mim32.exe, zam.exe and zam.bat to cover tracks. “delete files such as mim.exe, mim32.exe, zam.exe and zam.bat to cover their tracks.”
- [T1036.004] Masquerade Task or Service – The ransomware binary svhost.exe is named to mimic svchost.exe. “ransomware binary was named svhost.exe to mimic svchost.exe.”
- [T1555] Credentials from Password Stores – Mimikatz is used to dump credentials. “Credentials from Password Stores [T1555]… Mimikatz to dump passwords.”
- [T1003] OS Credential Dumping – Mimikatz dumps passwords from OS credential stores. “OS Credential Dumping [T1003], LSASS Memory [T1003.001].”
- [T1003.001] LSASS Memory – Mimikatz dumps credentials from LSASS memory. “LSASS Memory [T1003.001]… Mimikatz.”
- [T1021.001] Remote Desktop Protocol – RDP is used to move laterally within targets. “Remote Desktop Protocol” in the TTPs.
- [T1570] Lateral Tool Transfer – Splashtop is used to transfer tools between hosts. “Lateral Tool Transfer [T1570]… Splashtop to transfer malicious tools.”
- [T1105] Ingress Tool Transfer – Splashtop transfers netscan.exe/netscan.xml/netscan.lic/newuser.bat/start.bat/turnoff.bat. “
- [T1219] Remote Access Software – Splashtop is installed and executed for remote access. “Remote Access Software [T1219]… Splashtop.”
- [T1046] Network Service Discovery – NetScan enumerates hosts and services in the victim’s domain. “Network Service Discovery [T1046]… NetScan to enumerate hosts.”
- [T1069] Permission Groups Discovery – NetScan enumerates Administrators group membership. “Permission Groups Discovery [T1069]… Administrators group.”
- [T1016] System Network Configuration Discovery – Indirect reference to network discovery tools identifying network configuration. “System Network Configuration Discovery [T1016]…”
- [T1486] Data Encrypted for Impact – Trigona encrypts files with ._locked extension. “Data Encrypted for Impact [T1486]… _locked.”
- [T1489] Service Stop – Turnoff.bat stops services related to remote tools and virtualization platforms. “Service Stop [T1489]… stop services.”
- [T1490] Inhibit System Recovery – Turnoff.bat deletes Volume Shadow Copies. “Inhibit System Recovery [T1490]… Delete Volume Shadow Copies.”
Indicators of Compromise
- [File Hash] bef87e4d9fcaed0d8b53bce84ff5c5a70a8a30542100ca6d7822cbc8b76fef13 – svhost.exe (Ransomware Binary)
- [Hash] 853909af98031c125a351dad804317c323599233e9b14b79ae03f9de572b014e – Splashtop
- [Hash] 24123421dd5b78b79abca07bf2dac683e574bf9463046a1d6f84d1177c55f5e5 – Netscan
- [Hash] 4724EE7274C31C8D418904EE7E600D92680A54FECDAC28606B1D73A28ECB0B1E – Netscan
- [Hash] e22008893c91cf5bfe9f0f41e5c9cdafae178c0558728e9dfabfc11c34769936 – Netscan
- [Hash] 8d069455c913b1b2047026ef290a664cef2a2e14cbf1c40dce6248bd31ab0067 – Netscan
- [Hash] 544a4621cba59f3cc2aeb3fe34c2ee4522593377232cd9f78addfe537e988ddc – start.bat
- [Hash] a15c7b264121a7c202c74184365ca13b561fb303fb8699299039a59ab376adc6 – turnoff.bat
- [Hash] b7fba3abee8fd3bdac2d05c47ab75fdaa0796722451bed974fb72e442ab4fefd – newuser.bat
- [Hash] e5cf252041045b037b9a358f5412ae004423ad23eac17f3b03ebef7c8147a3bb – Mimikatz
- [Hash] 5603d4035201a9e6d0e130c561bdb91f44d8f21192c8e2842def4649333757ab – Mimikatz
- [Hash] 69f245dc5e505d2876e2f2eec87fa565c707e7c391845fa8989c14acabc2d3f6 – Mimikatz
- [Email] phandaledr@onionmail[.]org – Ransom note contact email
- [Email] farusbig@tutanota[.]com – Ransom note contact email
- [Filename] how_to_decrypt.hta – Ransom note file
- [Hash] 94979b61bba5685d038b4d66dd5e4e0ced1bba4c41ac253104a210dd517581b8 – DC2.exe
- [Hash] 9c8a4159166062333f2f74dd9d3489708c35b824986b73697d5c34869b2f7853 – DC4.exe
- [Hash] c5d09435d428695ce41526b390c17557973ee9e7e1cf6ca451e5c0ae443470ca – DC6.exe
- [URL] 3x55o3u2b7cjs54eifja5m3ottxntlubhjzt6k6htp5nrocjmsxxh7ad[.]onion – Tor negotiation portal
- [IP] 45.227.253[.]99 – Trigona leak site/IP
- [IP] 45.227.253[.]106 – Trigona leak site/IP
- [IP] 45.227.253[.]98 – Trigona activity IP
- [IP] 45.227.253[.]107 – Trigona activity IP
Read more: https://unit42.paloaltonetworks.com/trigona-ransomware-update/