General

  • Target

    1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin

  • Size

    101KB

  • Sample

    200826-k8ykljftvn

  • MD5

    42e106fd843b0e3585057c30424f695a

  • SHA1

    7b7f0c029a3dcb34a7a448f05b43c5657dd0c471

  • SHA256

    1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24

  • SHA512

    70acd1c36f44bfa4bb6c4dbf40275e2d508e5a610117de2835435a95950549b33c89b012ea3772c85d6189ee06b575bbe193cbe0aa8fb1a8ad9f4a20192e0ae8

Score
10/10

Malware Config

Targets

    • Target

      1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin

    • Size

      101KB

    • MD5

      42e106fd843b0e3585057c30424f695a

    • SHA1

      7b7f0c029a3dcb34a7a448f05b43c5657dd0c471

    • SHA256

      1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24

    • SHA512

      70acd1c36f44bfa4bb6c4dbf40275e2d508e5a610117de2835435a95950549b33c89b012ea3772c85d6189ee06b575bbe193cbe0aa8fb1a8ad9f4a20192e0ae8

    Score
    10/10
    • Conti Ransomware

      Ransomware generally thought to be a successor to Ryuk.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.