General

  • Target

    8fd7c81d43f8469246321a90b8d4f7f7fd72beb01105241536f9a058f4a7f990

  • Size

    557KB

  • Sample

    220327-mpx14sgeg2

  • MD5

    c2fba37cf1416e0f9b29b8fbd54d5374

  • SHA1

    3761b6fe71d30ba3a2c9dfd87de851da4158f144

  • SHA256

    8fd7c81d43f8469246321a90b8d4f7f7fd72beb01105241536f9a058f4a7f990

  • SHA512

    405648da26330a273a21de4fe6427610028e47cebf03bd143f78da9c02dd07347ffae418d29e1968606c51bfac57ecb34f872187559e2804e1f00fe1f76615a8

Score
10/10

Malware Config

Extracted

Path

C:\readme.txt

Family

conti

Ransom Note
All of your files are currently encrypted by CONTI strain. If you don't know who we are - just "Google it." As you already know, all of your data has been encrypted by our software. It cannot be recovered by any means without contacting our team directly. DON'T TRY TO RECOVER your data by yourselves. Any attempt to recover your data (including the usage of the additional recovery software) can damage your files. However, if you want to try - we recommend choosing the data of the lowest value. DON'T TRY TO IGNORE us. We've downloaded a pack of your internal data and are ready to publish it on our news website if you do not respond. So it will be better for both sides if you contact us as soon as possible. DON'T TRY TO CONTACT feds or any recovery companies. We have our informants in these structures, so any of your complaints will be immediately directed to us. So if you will hire any recovery company for negotiations or send requests to the police/FBI/investigators, we will consider this as a hostile intent and initiate the publication of whole compromised data immediately. To prove that we REALLY CAN get your data back - we offer you to decrypt two random files completely free of charge. You can contact our team directly for further instructions through our website : TOR VERSION : (you should download and install TOR browser first https://torproject.org) http://contirec7nchr45rx6ympez5rjldibnqzh7lsa56lvjvaeywhvoj3wad.onion/dbhpSXxriapOZ0CtZJlI0jCeyittNdeDJOP0RrdpQmC5cYmmKmIP6dxY927fYDZS YOU SHOULD BE AWARE! We will speak only with an authorized person. It can be the CEO, top management, etc. In case you are not such a person - DON'T CONTACT US! Your decisions and action can result in serious harm to your company! Inform your supervisors and stay calm!
URLs

http://contirec7nchr45rx6ympez5rjldibnqzh7lsa56lvjvaeywhvoj3wad.onion/dbhpSXxriapOZ0CtZJlI0jCeyittNdeDJOP0RrdpQmC5cYmmKmIP6dxY927fYDZS

Targets

    • Target

      8fd7c81d43f8469246321a90b8d4f7f7fd72beb01105241536f9a058f4a7f990

    • Size

      557KB

    • MD5

      c2fba37cf1416e0f9b29b8fbd54d5374

    • SHA1

      3761b6fe71d30ba3a2c9dfd87de851da4158f144

    • SHA256

      8fd7c81d43f8469246321a90b8d4f7f7fd72beb01105241536f9a058f4a7f990

    • SHA512

      405648da26330a273a21de4fe6427610028e47cebf03bd143f78da9c02dd07347ffae418d29e1968606c51bfac57ecb34f872187559e2804e1f00fe1f76615a8

    Score
    10/10
    • Conti Ransomware

      Ransomware generally thought to be a successor to Ryuk.

MITRE ATT&CK Matrix

Tasks