Affiliates of the Trigona ransomware are escalating their operational capabilities by deploying a custom-developed data exfiltration tool. Identified by Symantec researchers, the tool, named uploader_client.exe, is designed to streamline the data theft phase of their double-extortion attacks. This represents a significant tactical evolution for the Ransomware-as-a-Service (RaaS) group, moving away from generic, off-the-shelf tools that are frequently flagged by security products. The custom uploader is built for speed and stealth, incorporating features like parallel connections, connection rotation, and specific file-type filtering to maximize efficiency and minimize the chances of detection.
The Trigona ransomware operation, attributed to the cybercrime group Rhantus, has been active since late 2022. Like many RaaS operations, its affiliates have historically used common tools like Rclone or MegaSync for data exfiltration. However, as security vendors have improved their detection for these legitimate tools when used maliciously, more advanced threat actors are investing in custom malware.
The uploader_client.exe tool is a prime example of this trend. It is a command-line utility that offers attackers granular control over the data theft process, making their attacks faster and more focused.
Analysis of uploader_client.exe reveals several features designed for operational efficiency and evasion:
T1587.001 - Develop Capabilities: Malware) to replace generic tools. This immediately lowers the detection rate as the tool's signature is unknown to most antivirus and EDR solutions.T1041 - Exfiltration Over C2 Channel). This multi-threading is designed to saturate the victim's outbound bandwidth, minimizing the time required to steal large volumes of data.T1071.001 - Application Layer Protocol: Web Protocols) designed to defeat network monitoring systems that alert on long-lived, high-volume data flows. By breaking the exfiltration into multiple smaller connections, the activity may appear more benign.--exclude-ext flag, allowing attackers to ignore low-value, high-volume files like .mp3 or .mp4. This shows a focus on precision, targeting specific document types like PDFs and financial records to maximize the value of the stolen data (T1560.001 - Archive Collected Data: Archive via Utility).The use of custom tooling by a RaaS affiliate signifies a maturation of the threat. It lowers the barrier for less-skilled affiliates to conduct effective, stealthy attacks and makes detection harder for defenders. Organizations can no longer rely solely on blocking known exfiltration tools; they must now be able to detect the anomalous behavior associated with data theft, regardless of the tool being used. This development increases the likelihood of successful data breaches preceding ransomware deployment, putting more pressure on victims to pay the ransom.
uploader_client.exeSecurity teams should hunt for behavioral indicators of data exfiltration:
High-volume outbound traffic*.exe%TEMP%, %APPDATA%) that initiates numerous outbound network connections.* --exclude-ext *NetFlow/IPFIX dataNetwork Traffic Analysis (D3-NTA).System File Analysis (D3-SFA) is relevant here.uploader_client.exe from running. This is a core component of D3FEND's Executable Allowlisting (D3-EAL).Use application control solutions (whitelisting) to prevent the execution of unauthorized and custom tools like uploader_client.exe.
Implement strict egress filtering to block or alert on outbound connections to unknown destinations or over non-standard ports.
Deploy EDR solutions capable of detecting anomalous behaviors, such as a process reading many files and initiating network connections, regardless of the process's signature.
While custom tools evade initial signatures, once identified, their hashes and characteristics should be added to endpoint protection platforms.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats