General

  • Target

    bce72f157baf8064117c80e67998acc83fd27f1de64e0c9a68ad5c9209bc2bd2

  • Size

    204KB

  • Sample

    220301-zww4lsdbdk

  • MD5

    782cb9520afa288d801af7d66f70100b

  • SHA1

    69ba88f3b9031e9667ae50079a70ed136d3eb99a

  • SHA256

    bce72f157baf8064117c80e67998acc83fd27f1de64e0c9a68ad5c9209bc2bd2

  • SHA512

    23115f9351e0d8dd9e2fad8b161dc6ccd8f168eaad27442560d05171679de3d3f49cec0f7499d71c2a5aae0407dbbac1f3ae92214bd028bb431d161aca2bfbc2

Score
10/10

Malware Config

Extracted

Path

C:\readme.txt

Family

conti

Ransom Note
All of your files are currently encrypted by CONTI strain. If you don't know who we are - just "Google it." As you already know, all of your data has been encrypted by our software. It cannot be recovered by any means without contacting our team directly. DON'T TRY TO RECOVER your data by yourselves. Any attempt to recover your data (including the usage of the additional recovery software) can damage your files. However, if you want to try - we recommend choosing the data of the lowest value. DON'T TRY TO IGNORE us. We've downloaded a pack of your internal data and are ready to publish it on our news website if you do not respond. So it will be better for both sides if you contact us as soon as possible. DON'T TRY TO CONTACT feds or any recovery companies. We have our informants in these structures, so any of your complaints will be immediately directed to us. So if you will hire any recovery company for negotiations or send requests to the police/FBI/investigators, we will consider this as a hostile intent and initiate the publication of whole compromised data immediately. To prove that we REALLY CAN get your data back - we offer you to decrypt two random files completely free of charge. You can contact our team directly for further instructions through our website : TOR VERSION : (you should download and install TOR browser first https://torproject.org) http://contirec7nchr45rx6ympez5rjldibnqzh7lsa56lvjvaeywhvoj3wad.onion/LRJGK3K7QOL4vjslZNHfgF2rtwTW20Td9t6E1BDQGzftpW51Vb6xYFWvchsHF8u9 YOU SHOULD BE AWARE! We will speak only with an authorized person. It can be the CEO, top management, etc. In case you are not such a person - DON'T CONTACT US! Your decisions and action can result in serious harm to your company! Inform your supervisors and stay calm!
URLs

http://contirec7nchr45rx6ympez5rjldibnqzh7lsa56lvjvaeywhvoj3wad.onion/LRJGK3K7QOL4vjslZNHfgF2rtwTW20Td9t6E1BDQGzftpW51Vb6xYFWvchsHF8u9

Targets

    • Target

      bce72f157baf8064117c80e67998acc83fd27f1de64e0c9a68ad5c9209bc2bd2

    • Size

      204KB

    • MD5

      782cb9520afa288d801af7d66f70100b

    • SHA1

      69ba88f3b9031e9667ae50079a70ed136d3eb99a

    • SHA256

      bce72f157baf8064117c80e67998acc83fd27f1de64e0c9a68ad5c9209bc2bd2

    • SHA512

      23115f9351e0d8dd9e2fad8b161dc6ccd8f168eaad27442560d05171679de3d3f49cec0f7499d71c2a5aae0407dbbac1f3ae92214bd028bb431d161aca2bfbc2

    Score
    10/10
    • Conti Ransomware

      Ransomware generally thought to be a successor to Ryuk.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Drops startup file

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks