Contact us Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks

YARA Rule: trigona.yar

Group:
Valid Rule

/*
Trigona ransomware
*/

rule Trigona_Ransomnote
{
    meta:
        author = "ransomware.live"
        family = "ransomware.trigona"
        description = "Detects Trigona ransomware ransom note"
        date = "2026-05-04"
        severity = 7
        score = 70

    strings:
        $s1 = "_how_to_decrypt.hta" ascii nocase
        $s2 = "TRIGONA" ascii nocase
        $s3 = "._locked" ascii
        $s4 = "trigona.onion" ascii nocase

    condition:
        any of them
}

rule Trigona_PE
{
    meta:
        author = "ransomware.live"
        family = "ransomware.trigona"
        description = "Detects Trigona ransomware executable"
        date = "2026-05-04"
        severity = 9
        score = 90

    strings:
        $s1 = "TRIGONA" ascii wide
        $s2 = "_how_to_decrypt.hta" ascii
        $s3 = "NTRUEncrypt" ascii nocase

    condition:
        uint16(0) == 0x5A4D and 2 of them
}