General

  • Target

    79e41bb5b4edef24742f9e376add4bafdb9cbeb9cb8ae256a36df74694d820b9.bin.sample

  • Size

    101KB

  • Sample

    210928-let12abde8

  • MD5

    19ac3de21c70e04c45c51163137fcbdd

  • SHA1

    c2fea43d827c628d4d77a18119e8daadfda2b158

  • SHA256

    79e41bb5b4edef24742f9e376add4bafdb9cbeb9cb8ae256a36df74694d820b9

  • SHA512

    9f29958b4c875d08347c65b2e952cd1cb8378f4780f7189c3eba7339cbfc8767f5d69cc1ff868543cf81e39b4161eb987d9546c9413fb12f2f3a01a3bfae1208

Score
10/10

Malware Config

Targets

    • Target

      79e41bb5b4edef24742f9e376add4bafdb9cbeb9cb8ae256a36df74694d820b9.bin.sample

    • Size

      101KB

    • MD5

      19ac3de21c70e04c45c51163137fcbdd

    • SHA1

      c2fea43d827c628d4d77a18119e8daadfda2b158

    • SHA256

      79e41bb5b4edef24742f9e376add4bafdb9cbeb9cb8ae256a36df74694d820b9

    • SHA512

      9f29958b4c875d08347c65b2e952cd1cb8378f4780f7189c3eba7339cbfc8767f5d69cc1ff868543cf81e39b4161eb987d9546c9413fb12f2f3a01a3bfae1208

    Score
    10/10
    • Conti Ransomware

      Ransomware generally thought to be a successor to Ryuk.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

File Deletion

2
T1107

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Impact

Inhibit System Recovery

2
T1490

Tasks