General

  • Target

    0407468ec50f7f553be379d9c7042560f443c8f40919309a771a210dc34823cf

  • Size

    215KB

  • Sample

    210917-gdywdahgan

  • MD5

    ae5cab1c2ef1b24bb3a998737229427b

  • SHA1

    271a5a395e974dcc9c0b6e25d66631ff42dd777f

  • SHA256

    0407468ec50f7f553be379d9c7042560f443c8f40919309a771a210dc34823cf

  • SHA512

    231b157899aa5f59085131c66fd99558490e88a55efe5bb0f7ddbf7a162d3abcffbdf13d4a023d7e55fa5b883dccc96640865ddc73a4baf5669bf5f4fedb1813

Score
10/10

Malware Config

Extracted

Path

C:\readme.txt

Family

conti

Ransom Note
All of your files are currently encrypted by CONTI strain. As you know (if you don't - just "google it"), all of the data that has been encrypted by our software cannot be recovered by any means without contacting our team directly. If you try to use any additional recovery software - the files might be damaged, so if you are willing to try - try it on the data of the lowest value. To make sure that we REALLY CAN get your data back - we offer you to decrypt 2 random files completely free of charge. You can contact our team directly for further instructions through our website : TOR VERSION : (you should download and install TOR browser first https://torproject.org) http://contirecj4hbzmyzuydyzrvm2c65blmvhoj2cvf25zqj2dwrrqcq5oad.onion/ HTTPS VERSION : https://contirecovery.xyz/ YOU SHOULD BE AWARE! Just in case, if you try to ignore us. We've downloaded a pack of your internal data and are ready to publish it on out news website if you do not respond. So it will be better for both sides if you contact us as soon as possible. ---BEGIN ID--- Qce0EFpjBruV4DsoHAq1CrGLbCFsBSFJ6Ay5Ca7nWhamHuH4CerYOAjyKbqC4XNA ---END ID---
URLs

http://contirecj4hbzmyzuydyzrvm2c65blmvhoj2cvf25zqj2dwrrqcq5oad.onion/

https://contirecovery.xyz/

Targets

    • Target

      0407468ec50f7f553be379d9c7042560f443c8f40919309a771a210dc34823cf

    • Size

      215KB

    • MD5

      ae5cab1c2ef1b24bb3a998737229427b

    • SHA1

      271a5a395e974dcc9c0b6e25d66631ff42dd777f

    • SHA256

      0407468ec50f7f553be379d9c7042560f443c8f40919309a771a210dc34823cf

    • SHA512

      231b157899aa5f59085131c66fd99558490e88a55efe5bb0f7ddbf7a162d3abcffbdf13d4a023d7e55fa5b883dccc96640865ddc73a4baf5669bf5f4fedb1813

    Score
    10/10
    • Conti Ransomware

      Ransomware generally thought to be a successor to Ryuk.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Drops startup file

    • Drops desktop.ini file(s)

MITRE ATT&CK Matrix

Tasks