Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. Conti

Conti

Conti is a Ransomware-as-a-Service (RaaS) that was first observed in December 2019.Conti has been deployed viaTrickBot and used against major corporations and government agencies, particularly those in North America. As with other ransomware families, actors usingConti steal sensitive files and information from compromised networks, and threaten to publish this data unless the ransom is paid.[1][2][3]

ID: S0575
Type: MALWARE
Platforms: Windows
Contributors: Daniyal Naeem, BT Security
Version: 2.2
Created: 17 February 2021
Last Modified: 16 April 2025
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1059.003Command and Scripting Interpreter:Windows Command Shell

Conti can utilize command line options to allow an attacker control over how it scans and encrypts files.[2][4]

EnterpriseT1486Data Encrypted for Impact

Conti can useCreateIoCompletionPort(),PostQueuedCompletionStatus(), andGetQueuedCompletionPort() to rapidly encrypt files, excluding those with the extensions of .exe, .dll, and .lnk. It has used a different AES-256 encryption key per file with a bundled RAS-4096 public encryption key that is unique for each victim.Conti can use "Windows Restart Manager" to ensure files are unlocked and open for encryption.[1][2][3][5][4]

EnterpriseT1140Deobfuscate/Decode Files or Information

Conti has decrypted its payload using a hardcoded AES-256 key.[1][2]

EnterpriseT1083File and Directory Discovery

Conti can discover files on a local system.[2]

EnterpriseT1490Inhibit System Recovery

Conti can delete Windows Volume Shadow Copies usingvssadmin.[2]

EnterpriseT1106Native API

Conti has used API calls during execution.[1][2]

EnterpriseT1135Network Share Discovery

Conti can enumerate remote open SMB network shares usingNetShareEnum().[2][5]

EnterpriseT1027Obfuscated Files or Information

Conti can use compiler-based obfuscation for its code, encrypt DLLs, and hide Windows API calls.[2][1][5]

EnterpriseT1057Process Discovery

Conti can enumerate through all open processes to search for any that have the string "sql" in their process name.[2]

EnterpriseT1055.001Process Injection:Dynamic-link Library Injection

Conti has loaded an encrypted DLL into memory and then executes it.[1][2]

EnterpriseT1021.002Remote Services:SMB/Windows Admin Shares

Conti can spread via SMB and encrypts files on different hosts, potentially compromising an entire network.[1][2]

EnterpriseT1018Remote System Discovery

Conti has the ability to discover hosts on a target network.[5]

EnterpriseT1489Service Stop

Conti can stop up to 146 Windows services related to security, backup, database, and email solutions through the use ofnet stop.[2]

EnterpriseT1016System Network Configuration Discovery

Conti can retrieve the ARP cache from the local system by using theGetIpNetTable() API call and check to ensure IP addresses it connects to are for local, non-Internet, systems.[2]

EnterpriseT1049System Network Connections Discovery

Conti can enumerate routine network connections from a compromised host.[2]

EnterpriseT1080Taint Shared Content

Conti can spread itself by infecting other remote machines via network shared drives.[1][2]

Groups That Use This Software

Campaigns

IDNameDescription
C0015C0015

[4]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp