General

  • Target

    f963e2374a49355515086011726c1f3df4dd88060bdadb0e2d37e1daae8215ac

  • Size

    399KB

  • Sample

    240529-shsqpsag83

  • MD5

    4966d675ef2895c479a6dda0a544a781

  • SHA1

    87ade9cc258e7cb2edce7555bd1e8b649de94a9d

  • SHA256

    f963e2374a49355515086011726c1f3df4dd88060bdadb0e2d37e1daae8215ac

  • SHA512

    8c23dc3abe9e153e312f0ebef8cbb9ab1c61eb0b806b9442decd5655c7ba1428d5933a5158fe96158363a7de2e151ca0ffc2d4f4ff3307d3b2dc3d9caaa0fdf5

  • SSDEEP

    12288:7mIlX4PsyobFXJMSRpGe2IelMslQqn7GTFD:7V401XJX7G5ItslVM

Malware Config

Extracted

Path

C:\Program Files (x86)\readme.txt

Family

conti

Ransom Note
All of your files are currently encrypted by CONTI ransomware. If you try to use any additional recovery software - the files might be damaged or lost. To make sure that we REALLY CAN recover data - we offer you to decrypt samples. You can contact us for further instructions through: Our website TOR VERSION : (you should download and install TOR browser first https://torproject.org) http://contirecj4hbzmyzuydyzrvm2c65blmvhoj2cvf25zqj2dwrrqcq5oad.onion/ HTTPS VERSION : https://contirecovery.top YOU SHOULD BE AWARE! Just in case, if you try to ignore us. We've downloaded your data and are ready to publish it on out news website if you do not respond. So it will be better for both sides if you contact us ASAP. ---BEGIN ID--- LBCiop0VqOZuBBpA5nE826srUH9zTB8NeLk9dWX69K4nuopOjult1Wz9EY5DwmXn ---END ID---
URLs

http://contirecj4hbzmyzuydyzrvm2c65blmvhoj2cvf25zqj2dwrrqcq5oad.onion/

https://contirecovery.top

Targets

    • Target

      f963e2374a49355515086011726c1f3df4dd88060bdadb0e2d37e1daae8215ac

    • Size

      399KB

    • MD5

      4966d675ef2895c479a6dda0a544a781

    • SHA1

      87ade9cc258e7cb2edce7555bd1e8b649de94a9d

    • SHA256

      f963e2374a49355515086011726c1f3df4dd88060bdadb0e2d37e1daae8215ac

    • SHA512

      8c23dc3abe9e153e312f0ebef8cbb9ab1c61eb0b806b9442decd5655c7ba1428d5933a5158fe96158363a7de2e151ca0ffc2d4f4ff3307d3b2dc3d9caaa0fdf5

    • SSDEEP

      12288:7mIlX4PsyobFXJMSRpGe2IelMslQqn7GTFD:7V401XJX7G5ItslVM

    • Conti Ransomware

      Ransomware generally thought to be a successor to Ryuk.

    • Renames multiple (8026) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks