General

  • Target

    1c4da8bf2089e82a1665f7ac350eeea291dae7509d58dbfc2037ddc1997bfd13.bin.sample

  • Size

    99KB

  • Sample

    210928-jqjnbsbag5

  • MD5

    6748dfe8e64dea2fc4c14691f7e766c6

  • SHA1

    7211eb5a63a2cd6f340501b95c1acfe77fdd80f7

  • SHA256

    1c4da8bf2089e82a1665f7ac350eeea291dae7509d58dbfc2037ddc1997bfd13

  • SHA512

    8d5bcef5eee3faee1cf5c2b538807859e982b4dd1b94134a700e9af62321696588f7dad88fd4115fdfbcbd4efedb00a7199342f2a046b47e5818525719f1a703

Score
10/10

Malware Config

Targets

    • Target

      1c4da8bf2089e82a1665f7ac350eeea291dae7509d58dbfc2037ddc1997bfd13.bin.sample

    • Size

      99KB

    • MD5

      6748dfe8e64dea2fc4c14691f7e766c6

    • SHA1

      7211eb5a63a2cd6f340501b95c1acfe77fdd80f7

    • SHA256

      1c4da8bf2089e82a1665f7ac350eeea291dae7509d58dbfc2037ddc1997bfd13

    • SHA512

      8d5bcef5eee3faee1cf5c2b538807859e982b4dd1b94134a700e9af62321696588f7dad88fd4115fdfbcbd4efedb00a7199342f2a046b47e5818525719f1a703

    Score
    10/10
    • Conti Ransomware

      Ransomware generally thought to be a successor to Ryuk.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

File Deletion

2
T1107

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Impact

Inhibit System Recovery

2
T1490

Tasks