General

  • Target

    456dc28731284188734ef4724d38dca91dcba6c780e6268603365967522cdd6e.bin.sample

  • Size

    101KB

  • Sample

    210928-jxyqtsbba6

  • MD5

    99e55ce93392068c970384ab24a0e13d

  • SHA1

    7b5da09b8601ae4b4c934a5a46309f924591bb30

  • SHA256

    456dc28731284188734ef4724d38dca91dcba6c780e6268603365967522cdd6e

  • SHA512

    bb71853e46682ad0a81965edd7d1fbc523cce6f6e2d8641a11d5631738368531b0842bd860e384baf53a11e49be1f7c8c0ca33b1c11742a139f514966e1edb32

Score
10/10

Malware Config

Targets

    • Target

      456dc28731284188734ef4724d38dca91dcba6c780e6268603365967522cdd6e.bin.sample

    • Size

      101KB

    • MD5

      99e55ce93392068c970384ab24a0e13d

    • SHA1

      7b5da09b8601ae4b4c934a5a46309f924591bb30

    • SHA256

      456dc28731284188734ef4724d38dca91dcba6c780e6268603365967522cdd6e

    • SHA512

      bb71853e46682ad0a81965edd7d1fbc523cce6f6e2d8641a11d5631738368531b0842bd860e384baf53a11e49be1f7c8c0ca33b1c11742a139f514966e1edb32

    Score
    10/10
    • Conti Ransomware

      Ransomware generally thought to be a successor to Ryuk.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

File Deletion

2
T1107

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Impact

Inhibit System Recovery

2
T1490

Tasks