General

  • Target

    MFC_Stub.exe

  • Size

    639KB

  • Sample

    211101-lsr4lahdh4

  • MD5

    24095d5f0fb8533c72508fbecd40b516

  • SHA1

    8203863af49219e132241d0ce4b4cee0d66c7fed

  • SHA256

    41c56e92efd01a553d0faf39ccb440c7e84d32531335c262572d6a01bf7f70c8

  • SHA512

    0e22c86923d439d54f917320b0f6f4602d3f6c0ac1aa3f702e48a55f24e3cbf198fce3c989d37e525e2eba9afe8a0eb60e3c15b2af662ee7fece7557a2f594b7

Malware Config

Extracted

Path

C:\readme.txt

Family

conti

Ransom Note
All of your files are currently encrypted by CONTI ransomware. If you try to use any additional recovery software - the files might be damaged or lost. To make sure that we REALLY CAN recover data - we offer you to decrypt samples. You can contact us for further instructions through: Our website TOR VERSION : (you should download and install TOR browser first https://torproject.org) http://contirecj4hbzmyzuydyzrvm2c65blmvhoj2cvf25zqj2dwrrqcq5oad.onion/ HTTPS VERSION : https://contirecovery.ws YOU SHOULD BE AWARE! Just in case, if you try to ignore us. We've downloaded your data and are ready to publish it on out news website if you do not respond. So it will be better for both sides if you contact us ASAP ---BEGIN ID--- P9naBpvFModYOUO6KOdT1qyyFZuneeqjUZoYykxu8avGxV1rxugIPn13Yg1147un ---END ID---
URLs

http://contirecj4hbzmyzuydyzrvm2c65blmvhoj2cvf25zqj2dwrrqcq5oad.onion/

https://contirecovery.ws

Targets

    • Target

      MFC_Stub.exe

    • Size

      639KB

    • MD5

      24095d5f0fb8533c72508fbecd40b516

    • SHA1

      8203863af49219e132241d0ce4b4cee0d66c7fed

    • SHA256

      41c56e92efd01a553d0faf39ccb440c7e84d32531335c262572d6a01bf7f70c8

    • SHA512

      0e22c86923d439d54f917320b0f6f4602d3f6c0ac1aa3f702e48a55f24e3cbf198fce3c989d37e525e2eba9afe8a0eb60e3c15b2af662ee7fece7557a2f594b7

    • Conti Ransomware

      Ransomware generally thought to be a successor to Ryuk.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks