Resubmissions

21-03-2022 21:16

220321-z4ejjadgf3 10

21-03-2022 12:22

220321-pj7pgacccj 8

General

  • Target

    370b510335cc2f8bfabb348a2a4dc5293fecf8f17af76f52847dc260cdd83fde

  • Size

    644KB

  • Sample

    220321-z4ejjadgf3

  • MD5

    76863eb690c9385a6fb13503a60f0b7f

  • SHA1

    09af8728202201928db0fbe7c0364e6070fa26f3

  • SHA256

    370b510335cc2f8bfabb348a2a4dc5293fecf8f17af76f52847dc260cdd83fde

  • SHA512

    6f06bf8ef2b0d300090d4ecff807453699c3af9f85f8ac6ad7489877a72e693e59e73cbbf81a6a2f185dccba8b5b3790ec57b04e23e9a0a46ab206868e244d18

Malware Config

Extracted

Path

C:\readme.txt

Family

conti

Ransom Note
All of your files are currently encrypted by CONTI ransomware. If you try to use any additional recovery software - the files might be damaged or lost. To make sure that we REALLY CAN recover data - we offer you to decrypt samples. You can contact us for further instructions through: Our website TOR VERSION : (you should download and install TOR browser first https://torproject.org) http://contirecj4hbzmyzuydyzrvm2c65blmvhoj2cvf25zqj2dwrrqcq5oad.onion/ HTTPS VERSION : https://contirecovery.top YOU SHOULD BE AWARE! Just in case, if you try to ignore us. We've downloaded your data and are ready to publish it on out news website if you do not respond. So it will be better for both sides if you contact us ASAP. ---BEGIN ID--- LBCiop0VqOZuBBpA5nE826srUH9zTB8NeLk9dWX69K4nuopOjult1Wz9EY5DwmXn ---END ID---
URLs

http://contirecj4hbzmyzuydyzrvm2c65blmvhoj2cvf25zqj2dwrrqcq5oad.onion/

https://contirecovery.top

Targets

    • Target

      370b510335cc2f8bfabb348a2a4dc5293fecf8f17af76f52847dc260cdd83fde

    • Size

      644KB

    • MD5

      76863eb690c9385a6fb13503a60f0b7f

    • SHA1

      09af8728202201928db0fbe7c0364e6070fa26f3

    • SHA256

      370b510335cc2f8bfabb348a2a4dc5293fecf8f17af76f52847dc260cdd83fde

    • SHA512

      6f06bf8ef2b0d300090d4ecff807453699c3af9f85f8ac6ad7489877a72e693e59e73cbbf81a6a2f185dccba8b5b3790ec57b04e23e9a0a46ab206868e244d18

    • Conti Ransomware

      Ransomware generally thought to be a successor to Ryuk.

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v6

Tasks