General

  • Target

    1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin

  • Size

    101KB

  • Sample

    200826-k8ykljftvn

  • MD5

    42e106fd843b0e3585057c30424f695a

  • SHA1

    7b7f0c029a3dcb34a7a448f05b43c5657dd0c471

  • SHA256

    1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24

  • SHA512

    70acd1c36f44bfa4bb6c4dbf40275e2d508e5a610117de2835435a95950549b33c89b012ea3772c85d6189ee06b575bbe193cbe0aa8fb1a8ad9f4a20192e0ae8

Score
10/10

Malware Config

Targets

    • Target

      1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin

    • Size

      101KB

    • MD5

      42e106fd843b0e3585057c30424f695a

    • SHA1

      7b7f0c029a3dcb34a7a448f05b43c5657dd0c471

    • SHA256

      1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24

    • SHA512

      70acd1c36f44bfa4bb6c4dbf40275e2d508e5a610117de2835435a95950549b33c89b012ea3772c85d6189ee06b575bbe193cbe0aa8fb1a8ad9f4a20192e0ae8

    Score
    10/10
    • Conti Ransomware

      Ransomware generally thought to be a successor to Ryuk.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

File Deletion

2
T1107

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Impact

Inhibit System Recovery

2
T1490

Tasks