General

  • Target

    980cc58338038f70184403a98f1166b17938ebe362f373f4f366be1aaeecc923

  • Size

    230KB

  • Sample

    220306-zgek1sehb7

  • MD5

    3fd1a0e90f659cbe8526c97a76cbb9c9

  • SHA1

    9207419adf36dbdd9acf7cbe1066badf927d9d82

  • SHA256

    980cc58338038f70184403a98f1166b17938ebe362f373f4f366be1aaeecc923

  • SHA512

    43219db182d8b3fd2469853c5644f02aa903a597dcb1cfc547c8caaf6b5edb935a604dd6a6618174a73615bdd3bafe3c6d8b87166f6c021d008310717e686704

Score
10/10

Malware Config

Extracted

Path

C:\readme.txt

Family

conti

Ransom Note
All of your files are currently encrypted by CONTI strain. As you know (if you don't - just "google it"), all of the data that has been encrypted by our software cannot be recovered by any means without contacting our team directly. If you try to use any additional recovery software - the files might be damaged, so if you are willing to try - try it on the data of the lowest value. To make sure that we REALLY CAN get your data back - we offer you to decrypt 2 random files completely free of charge. You can contact our team directly for further instructions through our website : TOR VERSION : (you should download and install TOR browser first https://torproject.org) http://contirecj4hbzmyzuydyzrvm2c65blmvhoj2cvf25zqj2dwrrqcq5oad.onion/ HTTPS VERSION : https://contirecovery.click YOU SHOULD BE AWARE! Just in case, if you try to ignore us. We've downloaded a pack of your internal data and are ready to publish it on out news website if you do not respond. So it will be better for both sides if you contact us as soon as possible. ---BEGIN ID--- i1pBROMgzzCAAF9mJlL4Uk6olcIAFxAW5ID34fNHu0x7ZqB1k4Kq15BT7okw48gv ---END ID---
URLs

http://contirecj4hbzmyzuydyzrvm2c65blmvhoj2cvf25zqj2dwrrqcq5oad.onion/

https://contirecovery.click

Targets

    • Target

      980cc58338038f70184403a98f1166b17938ebe362f373f4f366be1aaeecc923

    • Size

      230KB

    • MD5

      3fd1a0e90f659cbe8526c97a76cbb9c9

    • SHA1

      9207419adf36dbdd9acf7cbe1066badf927d9d82

    • SHA256

      980cc58338038f70184403a98f1166b17938ebe362f373f4f366be1aaeecc923

    • SHA512

      43219db182d8b3fd2469853c5644f02aa903a597dcb1cfc547c8caaf6b5edb935a604dd6a6618174a73615bdd3bafe3c6d8b87166f6c021d008310717e686704

    Score
    10/10
    • Conti Ransomware

      Ransomware generally thought to be a successor to Ryuk.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Drops startup file

    • Drops desktop.ini file(s)

MITRE ATT&CK Matrix

Tasks