Conti

Conti
(Type: Ransomware, Big Game Hunting)

(Carbon Black) Conti uses a large number of independent threads to perform encryption, allowing up to 32 simultaneous encryption efforts, resulting in faster encryption compared to many other families. Conti also utilizes command line options to allow for control over how it scans for data, suggesting that the malware may commonly be spread and directly controlled by an adversary. This control introduces the novel ability of skipping the encryption of local files and only targeting networked SMB shares, including those from IP addresses specifically provided by the adversary. This is a very rare ability that’s previously been seen with the Sodinokibi ransomware family. Another new technique, documented in very few ransomware families, is the use of the Windows Restart Manager to ensure that all files can be encrypted. Just as Windows will attempt to cleanly shut down open applications when the operating system is rebooted, the ransomware will utilize the same functionality to cleanly close the application that has a file locked. By doing so, the file is freed up for encryption.

[News Analysis] Trends:

Total Trend: 202

Trend Per Year
13
2020
74
2021
104
2022
11
2023


Trend Per Month
1
Jul 2020
2
Aug 2020
1
Sep 2020
3
Oct 2020
3
Nov 2020
3
Dec 2020
2
Jan 2021
9
Feb 2021
1
Mar 2021
6
Apr 2021
5
May 2021
4
Jun 2021
4
Jul 2021
14
Aug 2021
6
Sep 2021
5
Oct 2021
12
Nov 2021
6
Dec 2021
2
2022
3
Jan 2022
15
Feb 2022
38
Mar 2022
17
Apr 2022
13
May 2022
6
Jun 2022
1
Jul 2022
3
Aug 2022
5
Sep 2022
1
Nov 2022
1
Jan 2023
2
Feb 2023
1
Mar 2023
3
Jun 2023
1
Jul 2023
2
Sep 2023
1
Oct 2023



[News Analysis] News Mention Another Threat Name:

110 - LockBit192 - Conti64 - BlackCat101 - Cobalt Strike60 - Hive32 - MimiKatz14 - Nokoyawa Ransomware10 - PLAY14 - Royal Ransom150 - Ryuk40 - SystemBC133 - TrickBot1 - Akira25 - Black Basta67 - Mount Locker41 - PhotoLoader51 - Babuk7 - BumbleBee4 - Meterpreter5 - Sliver4 - Somnia2 - AsyncRAT43 - HelloKitty129 - BazarBackdoor13 - Avoslocker79 - BlackMatter110 - DarkSide13 - Luna78 - RansomEXX13 - RedAlert Ransomware151 - REvil133 - Emotet2 - Veeam Dumper10 - AgendaCrypt10 - Brute Ratel C47 - Azorult7 - Mars Stealer7 - Raccoon7 - RedLine Stealer7 - Taurus Stealer7 - Vidar13 - BlackByte76 - Clop69 - Mespinoza83 - RagnarLocker77 - Ragnarok1 - VHD Ransomware5 - HermeticWiper8 - WhisperGate45 - AvosLocker90 - IcedID6 - DEADBOLT6 - DoubleZero9 - PartyTicket6 - StealBit34 - AnchorDNS34 - FAKEUPDATES34 - Griffon53 - ATOMSILO34 - Blister45 - FiveHands34 - Gozi34 - ISFB34 - JSSLoader55 - LockFile139 - Maze34 - NightSky34 - Pandora39 - Phobos34 - Phoenix Locker129 - QakBot34 - Rook138 - WastedLocker34 - BRONZE STARLIGHT94 - PlugX5 - RokRAT56 - Inception Framework5 - Red Menshen53 - Anchor4 - Diavol55 - Amadey33 - Buer116 - Mailto87 - Avaddon28 - BlackKingdom Ransomware28 - Cring28 - dearcry51 - Dharma88 - Egregor28 - Entropy28 - Epsilon Red36 - Gandcrab38 - Karma91 - Nefilim28 - RobinHood28 - SamSam33 - Snatch28 - WannaCryptor3 - EXOTIC LILY80 - DoppelPaymer76 - Nemty18 - Squirrelwaffle15 - VegaLocker15 - Yanluowang15 - Zeppelin4 - ClipBanker2 - TeamTNT2 - Prometheus5 - Tsunami66 - Dridex5 - Khonsari5 - Orcus RAT5 - TellYouThePass4 - Andromeda41 - Hades15 - Cerber7 - Locky8 - CryptoLocker25 - BADHATCH89 - FriedEx39 - MegaCortex13 - Hermes62 - Sekhmet25 - Cuba58 - MedusaLocker96 - Pay2Key68 - PwndLocker62 - SunCrypt28 - ThunderX1 - EternalPetya54 - VIKING SPIDER8 - TA210129 - SDBbot61 - Zloader53 - elf.wellmess53 - FlowerPower53 - PowGoop53 - 8.t Dropper53 - Agent.BTZ53 - Agent Tesla53 - Appleseed53 - Ave Maria53 - Bankshot53 - BLINDINGCAN53 - Chinoxy53 - Cotx RAT53 - Crimson RAT53 - DUSTMAN53 - FunnyDream93 - Hakbit53 - METALJACK53 - Oblique RAT53 - StoneDrill53 - StrongPity92 - SUNBURST53 - SUPERNOVA53 - TurlaRPC53 - Turla SilentMoon53 - WellMess92 - Winnti53 - ZeroCleare53 - APT1053 - APT2353 - APT2753 - APT3153 - APT4153 - BlackTech53 - BRONZE EDGEWOOD53 - MUSTANG PANDA53 - Red Charon53 - Red Nue53 - Sea Turtle53 - Tonto Team53 - Cutwail61 - DanaBot53 - JSOutProx53 - KerrDown53 - NedDnLoader53 - Pushdo61 - PyXie53 - Quasar RAT53 - ShadowPad61 - SmokeLoader53 - Snake53 - TEARDROP53 - KNOCKOUT SPIDER53 - OUTLAW SPIDER53 - RIDDLE SPIDER53 - SOLAR SPIDER27 - Empire Downloader27 - GootKit28 - Phorpiex16 - SMAUG


[TTP Analysis] Technique Performance:

reconnaissance
0/43
resource development
0/45
initial access
0/19
execution
2/36
persistence
0/113
privilege escalation
1/96
defense evasion
3/184
credential access
0/63
discovery
6/44
lateral movement
2/22
collection
0/37
command and control
0/39
exfiltration
0/18
impact
3/26


[TTP Analysis] Mitre Attack Matrix:

TA0043 TA0042 TA0001 TA0002 TA0003 TA0004 TA0005 TA0006 TA0007 TA0008 TA0009 TA0011 TA0010 TA0040
Reconnaissance Resource Development Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
T1059.003
Command And Scripting Interpreter : Windows Command Shell
T1106
Native Api
T1055.001
Process Injection : Dynamic-link Library Injection
T1140
Deobfuscate/decode Files Or Information
T1027
Obfuscated Files Or Information
T1055.001
Process Injection : Dynamic-link Library Injection
T1083
File And Directory Discovery
T1135
Network Share Discovery
T1057
Process Discovery
T1018
Remote System Discovery
T1016
System Network Configuration Discovery
T1049
System Network Connections Discovery
T1021.002
Remote Services : Smb/windows Admin Shares
T1080
Taint Shared Content
T1486
Data Encrypted For Impact
T1490
Inhibit System Recovery
T1489
Service Stop


[Infrastructure Analysis] Based on Related IOC:

IP:Port Timestamp
Domain Timestamp
URL Timestamp
https://contirecovery.info2023-04-25
http://m232fdxbfmbrcehbrj5iayknxnggf6niqfj6x4iedrgtab4qupzjlaid.onion2023-04-25


[Target Analysis] Region/Sector:

No information


References:

News Article (Credit @Malpedia)

Lighting the Exfiltration Infrastructure of a LockBit Affiliate (and more)

2023-10-03 by Luca Mella from

FIN12: A Cybercriminal Group with Multiple Ransomware

2023-09-12 by ANSSI from ANSSI

Multiple Foreign Nationals Charged in Connection with Trickbot Malware and Conti Ransomware Conspiracies

2023-09-07 by Office of Public Affairs from Department of Justice

Conti and Akira: Chained Together

2023-07-26 by Steven Campbell from Arctic Wolf

The Trickbot/Conti Crypters: Where Are They Now?

2023-06-27 by Charlotte Hammond from SecurityIntelligence

ransomware-descendants

2023-06-17 by EmissarySpider from Github (EmissarySpider)

Busy Bees - The Transformation of BumbleBee

2023-06-08 by Patrick Staubmann from VMRay

From Royal With Love

2023-03-10 by Jason Reaves from Medium walmartglobaltech

Malware analysis: part 8. Yara rule example for MurmurHash2. MurmurHash2 in Conti ransomware

2023-02-10 by cocomelonc from cocomelonc

New LockBit Green ransomware variant borrows code from Conti ransomware

2023-02-01 by Pierluigi Paganini from Security Affairs

Malware development tricks: part 26. Mutex. C++ example.

2023-01-04 by cocomelonc from

Threat Assessment: Luna Moth Callback Phishing Campaign

2022-11-21 by Kristopher Russo from Palo Alto Networks Unit 42

ESXi-Targeting Ransomware: The Threats That Are After Your Virtual Machines (Part 1)

2022-09-28 by Giovanni Vigna from vmware

Threat Report: Illuminating Volume Shadow Deletion

2022-09-20 by Dana Behling from vmware

AdvIntel's State of Emotet aka "SpmTools" Displays Over Million Compromised Machines Through 2022

2022-09-13 by Advanced Intelligence from AdvIntel

Conti vs. Monti: A Reinvention or Just a Simple Rebranding?

2022-09-07 by Intel 471 from Intel 471

The Curious Case of “Monti” Ransomware: A Real-World Doppelganger

2022-09-07 by Anuj Soni from Blackberry

Extortion Economics - Ransomware’s new business model

2022-08-22 by Microsoft from Microsoft

Flight of the Bumblebee: Email Lures and File Sharing Services Lead to Malware

2022-08-03 by Brad Duncan from Palo Alto Networks Unit 42

Initial Access Brokers Are Key to Rise in Ransomware Attacks

2022-08-02 by Insikt Group from Recorded Future

Luna and Black Basta — new ransomware for Windows, Linux and ESXi

2022-07-20 by Marc Rivero López from Kaspersky

The hateful eight: Kaspersky’s guide to modern ransomware groups’ TTPs (Download Form)

2022-06-23 by Nikita Nazarov from Kaspersky

The hateful eight: Kaspersky’s guide to modern ransomware groups’ TTPs

2022-06-23 by Nikita Nazarov from Kaspersky

The Sound of Malware

2022-06-23 by Christiaan Beek from Trellix

Attack Graph Emulating the Conti Ransomware Team’s Behaviors

2022-06-15 by Jackson Wells from AttackIQ

First Conti, then Hive: Costa Rica gets hit with ransomware again

2022-06-15 by Ofir Ashman from ThreatStop

Conti Targets Critical Firmware

2022-06-02 by Eclypsium from Eclypsium

Malware Analysis: Trickbot

2022-05-24 by Florian Goutin from The Hacker News

LockBit, Conti, and BlackCat Lead Pack Amid Rise in Active RaaS and Extortion Groups: Ransomware in Q1 2022 (PDF)

2022-05-23 by Trend Micro Research from Trend Micro

LockBit, Conti, and BlackCat Lead Pack Amid Rise in Active RaaS and Extortion Groups: Ransomware in Q1 2022

2022-05-23 by Matsugaya Shingo from Trend Micro

DisCONTInued: The End of Conti’s Brand Marks New Chapter For Cybercrime Landscape

2022-05-20 by Yelisey Boguslavskiy from AdvIntel

Wizard Spider In-Depth Analysis

2022-05-18 by PRODAFT from PRODAFT Threat Intelligence

Hydra with Three Heads: BlackByte & The Future of Ransomware Subsidiary Groups

2022-05-17 by Vitali Kremez from Advanced Intelligence

What malware to look for if you want to prevent a ransomware attack

2022-05-12 by Intel 471 from Intel 471

New ransomware trends in 2022

2022-05-11 by GReAT from Kaspersky

Ransomware-as-a-service: Understanding the cybercrime gig economy and how to protect yourself

2022-05-09 by Microsoft 365 Defender Threat Intelligence Team from Microsoft

Contileaks: Identifying, Extracting, & Modeling Bitcoin Addresses

2022-05-05 by Ryan Hallbeck from YouTube (The Vertex Project)

Conti and Hive ransomware operations: Leveraging victim chats for insights

2022-05-03 by Kendall McKay from Cisco

Conti and Hive ransomware operations: What we learned from these groups' victim chats

2022-05-03 by JON MUNSHAW from Talos Intelligence

Conti and Hive ransomware operations: Leveraging victim chats for insights

2022-05-02 by Kendall McKay from Cisco Talos

Adventures in the land of BumbleBee – a new malicious loader

2022-04-29 by Mike Stokkel from NCC Group

Cyber Threats 2021: A Year in Retrospect (Annex)

2022-04-28 by PWC UK from PWC

Ransomware: How Attackers are Breaching Corporate Networks

2022-04-28 by Karthikeyan C Kasiviswanathan from Symantec

Conti and Emotet: A constantly destructive duo

2022-04-26 by Intel 471 from Intel 471

GOLD ULRICK Continues Conti Operations Despite Public Disclosures

2022-04-21 by Counter Threat Unit ResearchTeam from Secureworks

Microsoft Exchange servers hacked to deploy Hive ransomware

2022-04-20 by Bill Toulas from Bleeping Computer

Conti Group Targets ESXi Hypervisors With its Linux Variant

2022-04-18 by Marc Elias from Trellix

Lessons from the Conti Leaks

2022-04-17 by BushidoToken from BushidoToken Blog

Karakurt revealed as data extortion arm of Conti cybercrime syndicate

2022-04-15 by Ionut Ilascu from Bleeping Computer

The Karakurt Web: Threat Intel and Blockchain Analysis Reveals Extension of Conti Business Model

2022-04-15 by Arctic Wolf from Arctic Wolf

Threat Profile: Conti

2022-04-12 by ConnectWise CRU from ConnectWise

Conti ransomware source code investigation - part 2

2022-04-11 by cocomelonc from

Hackers use Conti's leaked ransomware to attack Russian companies

2022-04-09 by Lawrence Abrams from Bleeping Computer

ConversingLabs Ep. 2: Conti pivots as ransomware as a service struggles

2022-04-08 by Paul Roberts from ReversingLabs

TRM Analysis Corroborates Suspected Ties Between Conti and Ryuk Ransomware Groups and Wizard Spider

2022-04-06 by TRM Labs from TRM Labs

Stolen Images Campaign Ends in Conti Ransomware

2022-04-04 by @0xtornado from The DFIR Report

Malware development tricks. Find kernel32.dll base: asm style. C++ example.

2022-04-02 by cocomelonc from Github (cocomelonc)

Conti Leaks: Examining the Panama Papers of Ransomware

2022-03-31 by John Fokker from Trellix

Conti-nuation: methods and techniques observed in operations post the leaks

2022-03-31 by Nikolaos Pantazopoulos from nccgroup

Conti ransomware source code investigation - part 1

2022-03-27 by cocomelonc from

Conti Ransomware Attacks Persist With an Updated Version Despite Leaks

2022-03-25 by Brett Stone-Gross from Zscaler

Gone in 52 Seconds…and 42 Minutes: A Comparative Analysis of Ransomware Encryption Speed

2022-03-23 by Shannon Davis from splunk

GOLD ULRICK Leaks Reveal Organizational Structure and Relationships

2022-03-23 by Counter Threat Unit ResearchTeam from Secureworks

Threat Intelligence Executive Report Volume 2022, Number 2

2022-03-23 by Counter Threat Unit ResearchTeam from Secureworks

Conti puts the ‘organized’ in organized crime

2022-03-23 by Intel 471 from Intel 471

Conti ransomware leaks - what happens when hackers support Russia

2022-03-22 by Ofir Ashman from ThreatStop

Conti Affiliate Exposed: New Domain Names, IP Addresses and Email Addresses Uncovered

2022-03-21 by eSentire Threat Response Unit (TRU) from eSentire

Conti Ransomware V. 3, Including Decryptor, Leaked

2022-03-21 by Lisa Vaas from Threat Post

Analysis of Leaked Conti Intrusion Procedures by eSentire’s Threat Response Unit (TRU)

2022-03-18 by eSentire Threat Response Unit (TRU) from eSentire

The Ransomware Threat Intelligence Center

2022-03-17 by Tilly Travers from Sophos

Exposing initial access broker with ties to Conti

2022-03-17 by Vladislav Stolyarov from Google

Exposing initial access broker with ties to Conti

2022-03-17 by Vladislav Stolyarov from Google

Suspected Conti Ransomware Activity in the Auto Manufacturing Sector

2022-03-16 by Josh Hanrahan from Dragos

The Ransomware Threat Landscape: What to Expect in 2022

2022-03-16 by Symantec Threat Hunter Team from Symantec

What Wicked Webs We Un-weave

2022-03-15 by Matt Stafford from Prevailion

Leaks of Conti Ransomware Group Paint Picture of a Surprisingly Normal Tech Start-Up… Sort Of

2022-03-10 by Check Point Research from

CISA updates Conti ransomware alert with nearly 100 domain names

2022-03-09 by Ionut Ilascu from Bleeping Computer

Conti Ransomware source code: a well-designed COTS ransomware

2022-03-08 by Luigi Martire from Yoroi

ContiLeaks

2022-03-08 by MBSD from MBSD

Inside Conti leaks: The Panama Papers of ransomware

2022-03-08 by Dina Temple-Raston from The Record

Conti-Ransomware-IOC

2022-03-08 by Arda Büyükkaya from Github (whichbuffer)

Ransomware gang Conti has already bounced back from damage caused by chat leaks, experts say

2022-03-07 by Suzanne Smalley from CyberScoop

IOC Resource for Russia-Ukraine Conflict-Related Cyberattacks

2022-03-03 by Trend Micro Research from Trend Micro

Cyberattacks are Prominent in the Russia-Ukraine Conflict

2022-03-03 by Trend Micro Research from Trend Micro

Conti's Source Code: Deep-Dive Into

2022-03-02 by Cluster25 from Cluster25

Cybercrime bosses warn that they will "fight back" if Russia is hacked

2022-03-02 by Carlos del Castillo from elDiario

Botleggers Exposed - Analysis of The Conti Leaks Malware

2022-03-02 by Sergei Frankoff from Youtube (OALabs)

Conti Ransomware Decryptor, TrickBot Source Code Leaked

2022-03-02 by Lisa Vaas from Threatpost

Conti Group Leaked!

2022-03-02 by CyberArk Labs from CyberArk

Conti Ransomware Group Diaries, Part II: The Office

2022-03-02 by Brian Krebs from KrebsOnSecurity

Conti Ransomware: An Analysis of Key Findings

2022-03 by Arctic Wolf from Arctic Wolf

Conti Ransomware source code leaked by Ukrainian researcher

2022-03-01 by Lawrence Abrams from Bleeping Computer

Twitter thread with highlights from conti leaks

2022-03-01 by The DFIR Report from Twitter (@TheDFIRReport)

Leaks: Conti / Trickbot

2022-03-01 by VX-Underground from

How I Cracked CONTI Ransomware Group’s Leaked Source Code ZIP File

2022-03-01 by Wade Hickey from Medium whickey000

Conti and Karma actors attack healthcare provider at same time through ProxyShell exploits

2022-02-28 by Sean Gallagher from Sophos

conti-leaks-englished

2022-02-28 by TheParmak from Github (TheParmak)

Analyzing conti-leaks without speaking russian — only methodology

2022-02-28 by Arnaud Zobec from Medium arnozobec

Conti ransomware's internal chats leaked after siding with Russia

2022-02-27 by Lawrence Abrams from Bleeping Computer

Conti ransomware gang chats leaked by pro-Ukraine member

2022-02-27 by Catalin Cimpanu from The Record

Il ransomware Conti si schiera a favore della Russia.

2022-02-25 by Red Hot Cyber from Red Hot Cyber

An Empirically Comparative Analysis of Ransomware Binaries

2022-02-23 by Shannon Davis from splunk

24 Hours From Log4Shell to Local Admin: Deep-Dive Into Conti Gang Attack on Fortune 500 (DFIR)

2022-02-23 by Vitali Kremez from AdvIntel

Cyberthreats during Russian-Ukrainian tensions: what can we learn from history to be prepared?

2022-02-22 by Chester Wisniewski from Sophos

Cybercrime Moves: Conti Ransomware Absorbs TrickBot Malware

2022-02-22 by Matthew J. Schwartz from Bankinfo Security

The Conti ransomware group takes over TrickBot malware operation and plans to replace it with BazarBackdoor malware.

2022-02-20 by Pierluigi Paganini from Security Affairs

Conti ransomware gang takes over TrickBot malware operation

2022-02-18 by Ionut Ilascu from Bleeping Computer

Ransomware Becomes Deadlier, Conti Makes the Most Money

2022-02-14 by Cyware from

Dragos ICS/OT Ransomware Analysis: Q4 2021

2022-02-09 by Anna Skelton from Dragos

HHS: Conti ransomware encrypted 80% of Ireland's HSE IT systems

2022-02-04 by Sergiu Gatlan from Bleeping Computer

Ransomware as a Service Innovation Curve

2022-01-27 by CoveWare from

Taiwanese Apple and Tesla contractor hit by Conti ransomware

2022-01-27 by Sergiu Gatlan from BleepingComputer

The Road to Ransomware Resilience, Part 2: Behavior Analysis

2022-01-24 by CyCraft AI from CyCraft

Money Over Morals: A Business Analysis of Conti Ransomware

2022 by Ian W. Gray from Symposium on Electronic Crime Research

Consequences- The Conti Leaks and future problems

2022 by Silent Push from Silent Push

Log4j Vulnerabilities: Attack Insights

2021-12-23 by Siddhesh Chandrayan from Symantec

Ransomware Advisory: Log4Shell Exploitation for Initial Access & Lateral Movement

2021-12-17 by Vitali Kremez from Advanced Intelligence

Diavol Ransomware

2021-12-13 by The DFIR Report from The DFIR Report

The double extortion business: Conti Ransomware Gang finds new avenues of negotiation

2021-12-08 by Justin Fier from Darktrace

Conti cyber attack on the HSE

2021-12-03 by HSE from HSE

Ransomware Spotlight: Conti

2021-12-01 by Trend Micro from Trend Micro

CONTInuing the Bazar Ransomware Story

2021-11-29 by The DFIR Report from The DFIR Report

Intelligence Insights: November 2021

2021-11-18 by The Red Canary Team from Red Canary

Conti Ransomware

2021-11-18 by Ghanshyam More from Qualys

Conti Ransomware Group In-Depth Analysis

2021-11-18 by PRODAFT from PRODAFT Threat Intelligence

Conti Ransomware Nets at Least $25.5 Million in Four Months

2021-11-18 by Elliptic Intel from Elliptic

How IronNet's Behavioral Analytics Detect REvil and Conti Ransomware

2021-11-16 by IronNet Threat Research from IronNet

ProxyShell, QBot, and Conti Ransomware Combined in a Series of Cyberattacks

2021-11-15 by Fabio Viggiani from TRUESEC

Stories from the SOC - Powershell, Proxyshell, Conti TTPs OH MY!

2021-11-10 by Josh Gomez from AT&T

THREAT ANALYSIS REPORT: From Shatak Emails to the Conti Ransomware

2021-11-09 by Aleksandar Milenkoski from Cybereason

CONTI Ransomware: Cheat Sheet

2021-11-07 by Marco Ramilli from Marco Ramilli's Blog

Detecting CONTI CobaltStrike Lateral Movement Techniques - Part 2

2021-11-02 by Cyb3rSn0rlax from unh4ck

Cybercrime underground flush with shipping companies’ credentials

2021-11-02 by Intel 471 from Intel 471

Detecting CONTI CobaltStrike Lateral Movement Techniques - Part 1

2021-10-26 by Hamza OUADIA from unh4ck

Conti Ransom Gang Starts Selling Access to Victims

2021-10-25 by Brian Krebs from KrebsOnSecurity

Advanced IP Scanner: the preferred scanner in the A(P)T toolbox

2021-10-22 by Krijn de Mik from HUNT & HACKETT

Ransomware as a Service: Enabler of Widespread Attacks

2021-10-05 by Fyodor Yarochkin from Trend Micro

BazarLoader and the Conti Leaks

2021-10-04 by The DFIR Report from The DFIR Report

Backup “Removal” Solutions - From Conti Ransomware With Love

2021-09-29 by Vitali Kremez from Advanced Intelligence

Alert (AA21-265A) Conti Ransomware

2021-09-22 by US-CERT from CISA

Big Game Hunting TTPs Continue to Shift After DarkSide Pipeline Attack

2021-09-14 by CrowdStrike Intelligence Team from CrowdStrike

BazarLoader to Conti Ransomware in 32 Hours

2021-09-13 by The DFIR Report from The DFIR Report

Conti affiliates use ProxyShell Exchange exploit in ransomware attacks

2021-09-03 by Sean Gallagher from Sophos

Translated: Talos' insights from the recently leaked Conti ransomware playbook

2021-09-02 by Caitlin Huey from Talos

An insider insights into Conti operations – Part two

2021-08-19 by sekoia from Sekoia

Hunting for Corporate Insurance Policies: Indicators of [Ransom] Exfiltration

2021-08-17 by Vitali Kremez from Advanced Intelligence

An insider insights into Conti operations – Part one

2021-08-17 by sekoia from Sekoia

The Ransomware Threat

2021-08-15 by Threat Hunter Team from Symantec

Secret "Backdoor" Behind Conti Ransomware Operation: Introducing Atera Agent

2021-08-11 by Vitali Kremez from Advanced Intelligence

Leaked Conti Ransomware Playbook - Red Team Reacts

2021-08-10 by OALabs from Youtube (OALabs)

A Detailed Analysis of The Last Version of Conti Ransomware

2021-08-10 by Vlad Pasca from LIFARS

Angry Affiliate Leaks Conti Ransomware Gang Playbook

2021-08-06 by Elizabeth Montalbano from Threat Post

Conti ransomware affiliate goes rogue, leaks “gang data”

2021-08-06 by Paul Ducklin from Sophos Naked Security

Disgruntled ransomware affiliate leaks the Conti gang’s technical manuals

2021-08-05 by Catalin Cimpanu from The Record

Tweet on Conti ransomware affiliates using AnyDesk, Atera, Splashtop, Remote Utilities and ScreenConnect to maintain network access

2021-08-05 by Peter Mackenzie from Twitter (@AltShiftPrtScn)

Angry Conti ransomware affiliate leaks gang's attack playbook

2021-08-05 by Lawrence Abrams from Bleeping Computer

Ransomware Gangs and the Name Game Distraction

2021-08-05 by Brian Krebs from KrebsOnSecurity

BazarCall to Conti Ransomware via Trickbot and Cobalt Strike

2021-08-01 by The DFIR Report from The DFIR Report

Tweet on Conti ransomware actor installing AnyDesk for remote access in victim environment

2021-07-21 by Peter Mackenzie from Twitter (@AltShiftPrtScn)

Conti Unpacked: Understanding Ransomware Development as a Response to Detection - A Detailed Technical Analysis

2021-07-08 by Idan Weizman from SentinelOne

Diavol - A New Ransomware Used By Wizard Spider?

2021-07-01 by Dor Neemani from Fortinet

The Most Prolific Ransomware Families: A Defenders Guide

2021-07-01 by Chad Anderson from DomainTools

Shelob Moonlight – Spinning a Larger Web From IcedID to CONTI, a Trojan and Ransomware collaboration

2021-06-30 by Max Malyutin from Cynet

Conti Ransomware Gang: An Overview

2021-06-18 by Richard Hickman from Palo Alto Networks Unit 42

Ransomware Double Extortion and Beyond: REvil, Clop, and Conti

2021-06-15 by Janus Agcaoili from Trend Micro

Under Attack: Protecting Against Conti, DarkSide, REvil and Other Ransomware

2021-06-02 by Josh Dalman from CrowdStrike

Alert Number CP-000147-MW: Conti Ransomware Attacks Impact Healthcare and First Responder Networks

2021-05-20 by FBI from FBI

Ransomware Attack on Health Sector - UPDATE 2021-05-16

2021-05-16 by NCSC Ireland from NCSC Ireland

Conti Ransomware

2021-05-12 by The DFIR Report from

Intelligence Report on Ransomware Gangs on the DarkWeb: List of victim organizations attacked by ransomware gangs released on the DarkWeb

2021-05-10 by DarkTracer from DarkTracer

Ransomware: Hunting for Inhibiting System Backup or Recovery

2021-05-06 by Brandon Denker from Cyborg Security

Combating Ransomware A Comprehensive Framework for Action: Key Recommendations from the Ransomware Task Force

2021-04-29 by The Institute for Security and Technology from The Institute for Security and Technology

Ransomware Attack Vectors Shift as New Software Vulnerability Exploits Abound

2021-04-26 by CoveWare from CoveWare

Ransomware and Data Leak Site Publication Time Analysis

2021-04-25 by Corsin Camichel from Vulnerability.ch Blog

Unraveling the internal structure of the Conti Ransomware

2021-04-13 by Takashi Yoshikawa from MBSD

Ransom Mafia - Analysis of the World's First Ransomware Cartel

2021-04-07 by Jon DiMaggio from ANALYST1

Ransom Mafia Analysis of the World's First Ransomware Cartel

2021-04-07 by Jon DiMaggio from ANALYST1

Ransomware Uncovered 2020/2021

2021-03 by Oleg Skulkin from Group-IB

Cyber Threats 2020: A Year in Retrospect

2021-02-28 by PWC UK from PWC UK

Ryuk Ransomware

2021-02-25 by CERT-FR from ANSSI

2021 Global Threat Report

2021-02-23 by CrowdStrike from CrowdStrike

Conti ransomware: Evasive by nature

2021-02-16 by Andrew Brandt from SophosLabs Uncut

A Conti ransomware attack day-by-day

2021-02-16 by Michael Heller from SophosLabs Uncut

What to expect when you’ve been hit with Conti ransomware

2021-02-16 by Peter Mackenzie from SophosLabs Uncut

CTIL Darknet Report – 2021

2021-02-11 by CTI LEAGUE from CTI LEAGUE

CONTI Modus Operandi and Bitcoin Tracking

2021-02-04 by ClearSky Research Team from ClearSky

De ataque con Malware a incidente de Ransomware

2021-02-02 by Germán Fernández from CRONUP

Tweet on Conti Ransomware group exploiting FortiGate VPNs to drop in CobaltStrike loaders

2021-01-17 by Peter Mackenzie from Twitter (@AltShiftPrtScn)

Cybereason vs. Conti Ransomware

2021-01-12 by Lior Rochberger from Cybereason

Conti Ransomware v2

2020-12-15 by Chuong Dong from Chuongdong blog

Reversing Conti Ransomware

2020-12-15 by 0xthreatintel from Medium 0xthreatintel

ContiUnpacker: An automatic unpacker for Conti rasnomware

2020-12-12 by Chuong Dong from Github (cdong1012)

The malware that usually installs ransomware and you need to remove right away

2020-11-20 by Catalin Cimpanu from ZDNet

Zooming into Darknet Threats Targeting Japanese Organizations

2020-11-18 by Victoria Kivilevich from KELA

Ransomware-as-a-service: The pandemic within a pandemic

2020-11-16 by Intel 471 from Intel 471

Leakware-Ransomware-Hybrid Attacks

2020-10-23 by Hornetsecurity Security Lab from Hornetsecurity

WIZARD SPIDER Update: Resilient, Reactive and Resolute

2020-10-16 by The Crowdstrike Intel Team from CrowdStrike

To Attack or Not to Attack: Targeting the Healthcare Sector in the Underground Ecosystem

2020-10-01 by Victoria Kivilevich from KELA

What's behind the increase in ransomware attacks this year?

2020-09-29 by Andy Auld from PWC UK

Ryuk successor Conti Ransomware releases data leak site

2020-08-25 by Lawrence Abrams from BleepingComputer

Is Conti the New Ryuk?

2020-08-18 by Arete Incident Response from Arete

TAU Threat Discovery: Conti Ransomware

2020-07-08 by Brian Baskin from VMWare Carbon Black

Basic Information (Credit @etda.or.th)

Tool: Conti

Names: Conti

Description: (Carbon Black) Conti uses a large number of independent threads to perform encryption, allowing up to 32 simultaneous encryption efforts, resulting in faster encryption compared to many other families. Conti also utilizes command line options to allow for control over how it scans for data, suggesting that the malware may commonly be spread and directly controlled by an adversary. This control introduces the novel ability of skipping the encryption of local files and only targeting networked SMB shares, including those from IP addresses specifically provided by the adversary. This is a very rare ability that’s previously been seen with the Sodinokibi ransomware family. Another new technique, documented in very few ransomware families, is the use of the Windows Restart Manager to ensure that all files can be encrypted. Just as Windows will attempt to cleanly shut down open applications when the operating system is rebooted, the ransomware will utilize the same functionality to cleanly close the application that has a file locked. By doing so, the file is freed up for encryption.

Category: Malware

Type: Ransomware, Big Game Hunting

Information: https://www.carbonblack.com/blog/tau-threat-discovery-conti-ransomware/

Information: https://areteir.com/wp-content/uploads/2020/08/Arete_Insight_Is-Conti-the-new-Ryuk_August2020.pdf

Information: https://www.zdnet.com/article/conti-ryuk-joins-the-ranks-of-ransomware-gangs-operating-data-leak-sites/

Information: https://www.cybereason.com/blog/cybereason-vs.-conti-ransomware

Information: https://www.coveware.com/conti-ransomware

Information: https://thedfirreport.com/2021/05/12/conti-ransomware/

Information: https://www.bleepingcomputer.com/news/security/fbi-conti-ransomware-attacked-16-us-healthcare-first-responder-orgs/

Information: https://unit42.paloaltonetworks.com/conti-ransomware-gang/

Information: https://cycrafttechnology.medium.com/conti-ransomware-in-taiwan-45b44f1ab0d8

Information: https://threatpost.com/affiliate-leaks-conti-ransomware-playbook/168442/

Information: https://blog.talosintelligence.com/2021/09/Conti-leak-translation.html

Information: https://news.sophos.com/en-us/2021/09/03/conti-affiliates-use-proxyshell-exchange-exploit-in-ransomware-attacks/

Information: https://www.csoonline.com/article/3638056/conti-ransomware-explained-and-why-its-one-of-the-most-aggressive-criminal-groups.html

Information: https://www.bleepingcomputer.com/news/security/australian-govt-raises-alarm-over-conti-ransomware-attacks/

Information: https://www.cisa.gov/uscert/ncas/alerts/aa21-265a

Information: https://blog.talosintelligence.com/2022/05/conti-and-hive-ransomware-operations.html

Information: https://www.malvuln.com/advisory/9eb9197cd58f4417a27621c4e1b25a71.txt

Information: https://www.trendmicro.com/en_us/research/22/f/conti-vs-lockbit-a-comparative-analysis-of-ransomware-groups.html

Information: https://arcticwolf.com/resources/blog/conti-and-akira-chained-together/

Mitre-attack: https://attack.mitre.org/software/S0575/

Malpedia: https://malpedia.caad.fkie.fraunhofer.de/details/win.conti

Alienvault-otx: https://otx.alienvault.com/browse/pulses?q=tag:conti

Playbook: https://pan-unit42.github.io/playbook_viewer/?pb=conti-ransomware

Playbook: https://usa.kaspersky.com/about/press-releases/2023_kaspersky-releases-tool-for-decrypting-conti-based-ransomware

Last-card-change: 2023-09-05

Source: https://apt.etda.or.th/cgi-bin/listtools.cgi

Indicators of Compromise (Credit @ThreatFox)

SHA256_HASH
  • ebeca2df24a55c629cf0ce0d4b703ed632819d8ac101b1b930ec666760036124
  • edfe81babf50c2506853fd8375f1be0b7bebbefb2e5e9a33eff95ec23e867de1
  • 4f17d7fa344b970890ed1bc52a0da95146cab9fe56ecabafafacb0ad212558c9
  • 1f782c00f48835beffd1cb068c1b43854b5f1542966dd5926589fece4a5058b3
  • 64485b3ea7ab067e7a83611f8c4caaf74482cdacb8a41bf118d967de3f1b51b2
  • e298d3e4ea2610e43eedcdc3171998943d645c187779f431424b7c0b39650d05
  • cf487bd54e487585cd052e982fd765cbc0d8d164cc21b8635e55475182dadf00
  • 2586026617b117506dfe326f50e45476ce765a74fe48c8650d32980a4dfe5ee9
  • ea524e8b0dd046561b59a8d4da5a122aeff02036c87bb03056437a1d0f584039
  • 1dea453e5344898c9a66309bd6d1cf6e21c56eb1427c026aac84b14a6b23f7fc
  • 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a
  • e30779c98cc860a022ea2b144176f73387b7306160445c351fbb4de9133db045
  • e58dde6a12fa539480a9e2d6f8342a7942703027969d396c19f1acffadcf284e
  • 1490e74b93b40176975836156dc62210b7670ab5eb38f153a21cda8c72bebc76
  • 34366c9a9ac34dd9016abd406cffe713a3e8606e8600e6cb07e0242904f91a5b
  • a7bff21d2695168b3f4aad1aa084f3a986d074a363ae52c7545536a98f00fe63
  • 198667b1eda010a431dfb051a101cc73ead1d45ba8d0f6641ec1c14bca4106f3
  • ef870eae64e28ebd71c8ad909af39ea9a072256bfd634210f4de24ded5a3304a
  • 4bfd58d4e4a6fe5e91b408bc190a24d352124902085f9c2da948ad7d79b72618
  • 66a57f4322182ffd7318bc81e5d7502db53a3153c28d9312dd6b443430936d46
  • eae876886f19ba384f55778634a35a1d975414e83f22f6111e3e792f706301fe
  • 603fbfe3d00baa8aa65288169af993b1a43cb6d02718204130922af513cc404b
  • 63e649bceaf74d6969434a4da1d71b4dc877d7eb32508d393a73d0737c70f1b6
  • 3995502a85cc12c6962740989c4fb800d514bdf2ec667fdb7e4c8206adca0235
  • 7236c8098c55ea1d144f4d6646e8cab8c7fdbde1d127d409b0d6a4ff1029628e
  • eacaab8d6520c9bf9dec6cbdffa7c4ad8c15fd57dd4165cf895a0aaae3ffe371
  • 1cfa2a966e7bfff50dd2026e890844af18deb672b96e941769a2e5fc3c1e0802
  • 14f9538dd611ca701bdbc6b34a0562e8b18c2492ff323b32557b36673434541a
  • 2d61e25b007c15e20c3269cccfc4f3986493ac2f5fa7ee627c7a9059109f664e
  • f20ed03ba228b36064517c1e5fff9ae40d957451a5c6d9a48f9bbe2c3dd881b7
  • 49dc5a243d322cd4d467e5f24b61ff749869564ddcf6a2f700839cf5ae9e37ea
  • 3e2ce6fd7b53224df92581b800ce9a6605eae878d4165df9ae8f73a488be3fa5
  • d1e0164c68c9ee348c437127c3a037d08767e9be5aded7a304bb1300a4a1aa35
  • 74aa5ff53c56c0eaf29d4fce536a55fa42d55cffa77b83671f8ef5bfa958665d
  • f0a674f3a449561a102eac9ee445b18bb15536429dca0c0ee020054952dd4899
  • 28fea198b1a127ecc10411d711c4df087fc2aa371223a02c13cad92dc465fc69
  • bc87bb72ce1ab19b2cff617a894fc1acf30bd3f9d2994235189ca8e5057fb354
  • 197dbb411a94c31ba2e150c24365ee37278a17b5c0211a0c667caf298bbd0dd1
  • 2f4f45f6624d1992bb474d7b245ebe8c316c0f8093fd1e313756c69680b844e6
  • b6d909bb2315ec139fa4704eead928f140919a621e22234160c7a1bfc6d2529e
  • 2f3d784f71d8c629d4ac3a2fac242db09b68d617873b2b0de461ba943ec42519
  • e043dea504d025f18f406d9649b64498338f3330ab9cf30e4efe9c0c2c0231df
  • 1ce8a939b3e7d84c59c12dc9e1091532f4336dac533847b6533b01d9dcf494e9
  • c8b1bb5ea01880b26e0d061216f6a408be85234e6deb241634017183adddcb2f
  • d3c75c5bc4ae087d547bd722bd84478ee6baf8c3355b930f26cc19777cd39d4c
  • 0aaacd11d8b956d317489d060e72946d28ab6aef9be1b541aff9904a750f4b51
  • 1be34c1ed6ad862678d6c5e58c190f0a86014975af6d79519b2006aa7614df79
  • c67ba4c6e872dbcd2b1281c33fb033f886d8472ea021cf3974a445c4b804fec2
  • dd4867c49f6080ac516b290e9dd1f131598b0222d038afccce5af55c133bf92a
  • 64a3a3ec70d20636299b8fe4f50c2b4d077f9934ee2d6ccf7d440b05b9770f56
  • 844cc2551f8bbfd505800bd3d135d93064600a55c45894f89f80b81fea3b0fa1
  • 8b26138a0e371f06fb51679c8d89f661c6ace3d35a90e569887a1b14ac5938e7
  • 3cc671401bf8bc4527a18e302ae9e673ba78f7f2273bab71ebc3fae8f2f25c07
  • 3125aa67fc6e09a00aad39e0eb8024b849d54de353b1a45b5297d4c5d5e87941
  • 004ede55a972e10d9a21bcf338b4907d6eed65bf5ad6abbbd5aec7d8484bdedf
  • 6fce6b5f101ab504115f1251a842d55c50a046d7fd92d1fe0f42e430900bc8c5
  • 949ee1522f6b132960d02bdd0681e28b0635a266d5ec7dcaa6838806beb927be
  • d417f3785a33da8b26ce68b62e66bdf7d46869b692fe325541a7be2b98119bd1
  • 58e3640032796983185ef3ce07d0fbce620514a73909d8573f72264a57ac8379
  • 9006eb87d3e0357ca3bb046c3db93e1aacfeaf5dd6d9ca751d35fe1e9bc77ed5
  • 1fa52ca9e2fbb3b80e63b6cbfc776bf1c14d434afe50167a4b11ffdbe1987b79
  • d6fb956ada8728768d0bfeb98402cbb4db0358fa2c0a28966669e770d72b75a5
  • f7b83f07f6fec1df0fa73c935c96dc2ec8fbe0de3b17bb56f9963c92c22715c3
  • 04bf10cd8186fa18bdec9948ae88099dd86ef444af46b20b444b351929a8f71b
  • 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5
  • 240ef5b7c57e2bb4a7c92668c71e96b40e5ef010350e0b552b559df10313a884
  • 620aceceb5eb0b43cf1a504fa6044675f114611a49e1c9c583da02b6eeddf507
  • d43b52e3453ce77d2694a239232f39341a98fa704954a558125e74a85f22a346
  • bd47cc015a113fae8f86975c2e59e2342c971bae162648f84a628c313caf1eca
  • c16a3ccc2ca18a936e56cb91cb271caef8b69076cf7bfa5af5867fbb7b71539b
  • 52c356000529ec0927939a7374457f4386533efede771d71af737cad253369d8
  • 184a36e242695e5f5a7bbb63cbf1a32a7bd434ab80bf5e39373ef76af794523e
  • e08bb07279311220463ea080ab02b42358aed73e4ebaebe1aa956746349c2941
  • 7ca57576c6a2d7dbf49faeafd4804c6b86d9af7fff1390c58a30eb9d9bf2fbfd
  • 1442db21423296acfbd729481cc5f3edb80591383a009f9feeb0ef2675cfc487
  • 703ee3222eccd0e355b9ef414be9153fa3a2ad8efb8176fee887d7744a9f632f
  • 307a8158e698680c7186e3c1481b29186d8b265bb83662397a54f235b0c9a3d1
  • d7868354f2dfe79e91adef4f7b24bcb60772a76c577bcc5c71709c8a3e26eb5d
  • 35d49eb7fa8740a53d6a84de7fd9b7d177df8d96d25a67b1bc18d2b685988828
  • 78023bc371e17e552cbf39390c9752edd3ecf7c3ee0c1624da8497792732f194
  • 4182ba86379572a9e66a14c4338d123b51642e894724d40928aa453da65f507a
  • c0fbff383681c6acb239bdee0a8f17282d1502bb5c32a500a3971e1cb7039b1a
  • 81ada6f810948fd3babd1f514db82a519fb289ba03c05941145b345ecf8ac7df
  • d167d334fa5ef8043b606f82682b87a1f201216df1c5540d289ee42439aa71ca
  • 0b0b902af452e1c949a609a3b29a9de21dac639846c77427de06e6e63c1fe904
  • 97469cb72db2b734861a1a7d27b2f90275b304ea87e5664cdfd75f2f4591922c
  • 4e3b5c5f42afbc601982cd49b723b493da0928d753548c7ed5e25927a597835b
  • 8df9b346bf591629a9eb0bf9f32c545a1266873495ceec9ba990be1dd22b9aa9
  • 473bcbcba12296b08b765b4f7c2beea5f56f263d5e6c0d15c1006af28f6172e8
  • d65864746746fd0718dba86bb077fdce60e491b6addd41f05752ad52a3d3aace
  • 61556c295a2788ebc9b82f1a214e9a79f87152a80f63febc1a039ab20a2c9be4
  • 983c499dd64ba2067a00f8ed032b1b367b2cc191d0ab3573c766efdd656c2cf9
  • 0460cfa76fb0a02be92b0bc99a09168ebe38dbc8eeb1aa966dca66f0e849b53d
  • 5c278c04bb19196dc8559d45b9728b3ba0c1bc5cdd20a766f56248e561c6f5a6
  • f848c62dbc910ee32990161cc598f550707d26c524394be35c7bdb7a62626047
  • 1201e76d42f85feb89d64e6fd497144ed3afe66281b2464e84f3b889f2867c9b
  • 87e6f7b20ea2bd35d947d9100fe6291dfe186cfedea5d451be14bab5d2518e89
  • fe1652f4b828c9f98ff4a37829f4a988ad3c1601fc0dff7f99fe941ae4e81864
  • 2d3dc442e7c1d55a1b28e0d91a3f14def468f3b704e35ead441953413b9a5b4a
  • e422aa32b5f26a15aedba1bf597a163cd99c4c7777608bf05c8be3b404d825a1
  • 626a1863c6cb57977bf75596d78b51cb8208fadec3d68eba1dd7b5a3c88578ce
  • 0fd062f86151b9d49d65b8f12c52737600bff8bb3462aba7bf23d820bf4d5518
  • c49584e33e2fa854cc80114ff467f862260afe79199ccbe4d96b7542a3cd87d1
  • 2a170da70452af68b6c6ff4c0821349c0490e9bdca16c2bc6a6a40dac59bc334
  • 83626579f6334700cb26ec528383f902a4152baf31a3d10482eee019039658ad
  • 03597628e999d791f4cc442328024235db9a929467a62ef0a00c91a76161f0e1
  • 23e95ba67603234352ff2864dc7fa54742f501e5922f01f8c182dbefc116f97f
  • dbfee080eb99d2c1fcba7e7d72191cef3b9f00ebd279a62147ccfb1ae17bdd84
  • c14f8bc656284715516f26935afe487a1d584f56ffabbcb98f2974f6ca6cd3a4
  • 6d11b0f83d725b745fc10a5224ce4cb0582c7f4e912347f681f1fbe599bb5c27
  • 8907548328b9bc8e04d0949e4a0e3bb9b749b45a32d9d95cbb9d6b27154d4310
  • bf5c167f6f4c6ff2cb86d1d3bbde94f86533f0fb18db13489ec18403ea3a0396
  • 53b1c1b2f41a7fc300e97d036e57539453ff82001dd3f6abf07f4896b1f9ca22
  • 4d8e709832dc3b6cc9283dc2c79eac0d9a4092b1a3b180d7cc7ec6902b7a128c
  • f99c69327a746f4fde02b7a550cf6c9f48e5e22fcb49bea0e3e4bc5a3efa605c
  • fc783af396a1bd9c81613cd051db69e778c102953aec0d6f67743846f3b862e6
  • c47d935ef7d88780968dfd3b68bbb7879a806e8b5d9373c920f3bf522159486f
  • 46112e017bc7804816e3b85f25630c283085ba74c7de0a4c1cf840d8a702f487
  • 5cf0a6ac9786638a063eea9ab68508f31e537072bbcea27371f9121d2668a251
  • 6ee0ab481d61828f19c749809d2623aad295042228da1148643d7c656ab3632f
  • 1a5d66450670c057bce6eff656b86dce21e729c46c86362ed50fe79c1b074f15
  • dbc76355c56a885a1475174fb5325d61b875fd6207ef465cae05617b49463a38
  • f11724258acba02fa817e411878cd2506c09f4d00fcc47302f55dc7748d50fd9
  • d338295d50d5b39d8377c593f6d46feb512823e2724704448cc885b40c5056e0
  • 808ab5f285878221da8fedda2220ebf5563e5b73729943d5cf63c7444c8dabc4
  • 6815e1e06e29863290319eb3e814ae2a394271aa2f95cc7c31a649c4c2f4fd04
  • 5eb02378eec4ce180d28d3d9410b7ccaeaa1cd5f15c8bfd8c398579c0f7ed2ed
  • a5751a46768149c5ddf318fd75afc66b3db28a5b76254ee0d6ae27b21712e266
  • 259eba04b9141fd6af0763f9c3f4dd0f114bff3d4bc52573962ba7ef923369c2
  • 17ac91a36237d8f37dcee961ba74c9310a45c009780ea092c3a1e428870ff8a1
  • e7ce83a1a5163487d86538344c4f37c72a795b07b03a40db7d36ec81a442d685
  • 63b44f7fe68cb8a05fa98c5acc59851d4b73f5bbd76e9910c94042c523da8d5b
  • 05c8aaae3fb6c9605f5c69f8eb73cc2c1f08bd72213492e24f221a2ef60508a3
  • 73bd8c2aa71f5dcd9d2ddd79e53656c6ae3db2535e08cf9dab1cd13bdd6d5ea3
  • 03b9c7a3b73f15dfc2dcb0b74f3e971fdda7d1d1e2010c6d1861043f90a2fecd
  • e532662996409a0f959353768936d95444ffee71d5f14536d603e031f183b012
  • e26f1702c232991efaed7177aaafd2f294d2315461a1619cb42541ef0aa8ae77
  • b3ebc0e725d6a9bd59a3c322dd6f67ccbf09b3c152ffef3e4f46d19eafcbde17
  • 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24
  • a5aeae61d5045abdc28dd0e78bd1cef6e4bc2beb5360696959f532a616435f70
  • ca87ce6c73fad0e70ac28e9ac9e0eeaf945298e26218b5bf986843053c891705
  • 81792fcbaad868d2e4aca1ed372f4a5abb34372d3265d5712a65cdfe05e42df8
  • 2fc6d7df9252b1e2c4eb3ad7d0d29c188d87548127c44cebc40db9abe8e5aa35
  • 79e41bb5b4edef24742f9e376add4bafdb9cbeb9cb8ae256a36df74694d820b9
  • 98c2e87de165909adedd40206fbda7a1f71a457d5aa97e9ab48546ab76ce3f6e
  • b42d07f0b72879bf21e99f39a21edae1a38c3fd62393bd4e88f1032f561855f9
  • 2452cf5c6fccf361fa27131d9b261a60253eef8b96e6e2f524c85beea6488bd0
  • 1ee0bbfe78f6da5eea5e4aad6992cfcfe3aa824584c04aa3fba5a0d9c605b997
  • 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476
  • 3db6e8df73f12b6a9fa9adb6ad87b017d530a9d736909338042735ed00a9463b
  • 90cfbbe316c94611fdb48029b5302df0980395528a812404cacbc39ef1a6bde0
  • 6f7043b24d9b4c30006781402f0cef2543c8f3e9087d79f6bcff43b1418ad21d
  • d8a0d25776c28e17e724da2b1c8fdae28d7c6b32cfa9d3d2a20f3f57ff370488
  • 1c4da8bf2089e82a1665f7ac350eeea291dae7509d58dbfc2037ddc1997bfd13
  • c97572a81dade2cc7d86b853196cd3487249f3495e8fbdd5bbad351421101b6b
  • d6b7b27e13700aaa7f108bf9e76473717a7a1665198e9aafcc2d2227ca11bba9
  • ae9ac54c03cabf642eb079b548fac353a477b5c11ec93296a5578715001c5f1c
  • b422ced27d9358665699d37648a640db10ade85e591a4cc6ceb16f01dbf9b3d6
  • fe6e84192da5c0210d4bd51e809792b28e60edb337917f903a7e9a31bc40cf86
  • 5c5d05c4dcc9489ed527a1a607f0e2884d10558451662bcc849e36da7eca570c
  • a47d7ff36064cab056d56dca4c466b4e98b331e4aed1d7aee2790cb9a94b1793
  • 904e0855772f56721cc157641a26bb7963651e5a45c3bb90764328b17081abd5
  • c57d20e273337da5239f1573212adc60eacf470873e67ea135508c7c749da37b
  • 49b2c44d9a304035e586a15c1eb06101dcd64cdc17b64a0d69d253e653ff25a7
  • 227164b06f201b07a8b82800adcc6a831cadaed6709d1473fd4182858fbd80a5
  • 040fcbd360c7498756519cb0e687120bd623da80784034ea89178409491b1c44
  • a05c8129e607c6d0976d79f69c6a020d15767a9ef3a9c9f1570c5193a7b5b76b
  • 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025
  • d21f53277c689939d94eced15e37c2f1e9bcbf547314ee26f4b21eee2102edbf
  • 09a0e87008e34a7a434c5d853600f693ab9de181e1f863ef6a90edf8c3fccd54
  • e285531e6b2774041cf240f612e9472a8fedd7c2ec2a3d796af72f73272f56c6
  • 3ab3c4ffcf366dcbe660506295dcef82d058cb25b1c0b362cc62371a19a0d5f8
  • 895493271f3e61a7bc6338f51a127d629b3f47c13e87b0a56f61ad42c3377689
  • 1125cdabe2e146734ffc13137f23901377509408c4531ea17fcb99d6666815f0
  • dd1c312400365691de6abd0b2ae79a671dea9a0aaddd354f720614716564d7d7
  • 6f0c6f447a18ad9fd81382b062d16d07eede05a15ab75870c0fdb43d421bb42d
  • 9e2ad47329661f8f65ca72dd32dc4e7dee931c148af4c71562d9fb347c8fc39d
  • 15ac17280f7e4b43eb21c090792465494eede0937897c271eb1cc14733dc371e
  • 677bb54137bb7c811fb5c7f3d64880619e72eb5adc6e0be7f8f70a7094688a32
  • 1ac3786a4cff03a66aebf942643dc04ba75ef412dc889a9deb0bde3df404b850
  • ba73f5c3a29254086490d525d8e892df8e9cf88ce0cafcbad958b1ba01e8222a
  • c36728e99f92b081dbe0479781d414c5c85b2ebfa35e46c9151efd4caf2124f8
  • 1dc9ca76545f967f4411aa1fb1834d0eacea4297520b7fb8aee1745d019008d1
  • e00fd91efb00ef5c4096eb52a40188f090888018f9c340b48ceea8db65d0a11f
  • ee93d7c53b631d33dbd2abd36af51e6880f73ab3be8d945f357ff3b4f8e0270a
  • a4c6f1b8fa158df05434ce436b18c0a12d63d0d81f07738d2b4d78eb2651cc7c
  • 0bb0e2a51144c71718b5b8d91f0818d324c7934f2869b7722e4854c1327a0ecf
  • 0fb5dbb86d0ce3889044b8b5004692f88fc81609fa2e2136b0ba9a410403f151
  • ecc5488a5d42ca1eaf37111f14e30d0da128c660306f86e2ced0098daf74b3d0
  • d21c71a090cd6759efc1f258b4d087e82c281ce65a9d76f20a24857901e694fc
  • a25b453cf679a36f9b7611d4b492ba8dc6223b1a1a02fc8c0da4a104dcf4fa12
  • af1408a4d276842bea2ff1528fc1d2b93889a1fc4a91c6594fc27af325120da8
  • 6906a72cfe38eb73bc668e6d0e7558997e365a6aa3760f77ab1dda6d88cc81d0
  • 036a4795d259d36b3396cd3a0fd46d4a103337c96fe911f5c362d5682bd58ba9
  • 909224f5de1c33d7bf71242ab16269a11b8a36b457ab1c55f37098887e26e0e5
  • d29b8160e51dd29474f3464111fc888da8adb2bc2f0d4f29ce71219ffc846bd5
  • 3a3a7b91d8890a05d46d7974a0d4e1fa32a1cc6784ddfac6203841291826c700
  • 0639bd0b76f285b2f5cad9ca40f7fa54439a9304aff7903648a35763d298f424
  • 1a00e34a91f41549541f2dc69959dbd804b57bcd3d38665a4d182a2d3db56b71
  • 888917af893dba578a9f4427cdd2a58d05be1e38c1b687352969e236a4136166
  • 62e70efef5075232feada6857c97b388ec98e1bb175c501c429117f550a1ad66
  • cdd9772750c4bbe47b952dc22824a1e5acf753acc40f123815971535deec10fd
  • 456dc28731284188734ef4724d38dca91dcba6c780e6268603365967522cdd6e
  • e505815e8a4c215f2ae567d8cf8de8a737c13c6f6990c113db6943ae30b93af9
  • 4478feb1e3c98220f50ce341665087b7f6c1d9c290e42f54812bc55da5b3707d
  • e76c7056eb310097574fd6b3d04d7bd91ca409ea390b635a55006d3c365994df
URL
  • https://contirecovery.info
  • http://m232fdxbfmbrcehbrj5iayknxnggf6niqfj6x4iedrgtab4qupzjlaid.onion
MD5_HASH
  • c7c5b8b0703950c40e6614bf957f94c1

TTP Info (Credit @Mitre)

TA0043 TA0042 TA0001 TA0002 TA0003 TA0004 TA0005 TA0006 TA0007 TA0008 TA0009 TA0011 TA0010 TA0040
Reconnaissance Resource Development Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
T1059.003
COMMAND AND SCRIPTING INTERPRETER : WINDOWS COMMAND SHELL
conti can utilize command line options to allow an attacker control over how it scans and encrypts files.
T1106
NATIVE API
conti has used api calls during execution.
T1055.001
PROCESS INJECTION : DYNAMIC-LINK LIBRARY INJECTION
conti has loaded an encrypted dll into memory and then executes it.
T1140
DEOBFUSCATE/DECODE FILES OR INFORMATION
conti has decrypted its payload using a hardcoded aes-256 key.
T1027
OBFUSCATED FILES OR INFORMATION
conti can use compiler-based obfuscation for its code, encrypt dlls, and hide windows api calls.
T1055.001
PROCESS INJECTION : DYNAMIC-LINK LIBRARY INJECTION
conti has loaded an encrypted dll into memory and then executes it.
T1083
FILE AND DIRECTORY DISCOVERY
conti can discover files on a local system.
T1135
NETWORK SHARE DISCOVERY
conti can enumerate remote open smb network shares using netshareenum().
T1057
PROCESS DISCOVERY
conti can enumerate through all open processes to search for any that have the string "sql" in their process name.
T1018
REMOTE SYSTEM DISCOVERY
conti has the ability to discover hosts on a target network.
T1016
SYSTEM NETWORK CONFIGURATION DISCOVERY
conti can retrieve the arp cache from the local system by using the getipnettable() api call and check to ensure ip addresses it connects to are for local, non-internet, systems.
T1049
SYSTEM NETWORK CONNECTIONS DISCOVERY
conti can enumerate routine network connections from a compromised host.
T1021.002
REMOTE SERVICES : SMB/WINDOWS ADMIN SHARES
conti can spread via smb and encrypts files on different hosts, potentially compromising an entire network.
T1080
TAINT SHARED CONTENT
conti can spread itself by infecting other remote machines via network shared drives.
T1486
DATA ENCRYPTED FOR IMPACT
conti can use createiocompletionport(), postqueuedcompletionstatus(), and getqueuedcompletionport() to rapidly encrypt files, excluding those with the extensions of .exe, .dll, and .lnk. it has used a different aes-256 encryption key per file with a bundled ras-4096 public encryption key that is unique for each victim. conti can use "windows restart manager" to ensure files are unlocked and open for encryption.
T1490
INHIBIT SYSTEM RECOVERY
conti can delete windows volume shadow copies using vssadmin.
T1489
SERVICE STOP
conti can stop up to 146 windows services related to security, backup, database, and email solutions through the use of net stop.