Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. INC Ransomware

INC Ransomware

INC Ransomware is a ransomware strain that has been used by theINC Ransom group since at least 2023 against multiple industry sectors worldwide.INC Ransomware can employ partial encryption combined with multi-threading to speed encryption.[1][2][3]

ID: S1139
Type: MALWARE
Platforms: Windows
Contributors: Matt Anderson, @‌nosecurething, Huntress
Version: 1.0
Created: 06 June 2024
Last Modified: 28 October 2024
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1486Data Encrypted for Impact

INC Ransomware can encrypt data on victim systems, including through the use of partial encryption and multi-threading to speed encryption.[1][2][4][5][1]

EnterpriseT1491.001Defacement:Internal Defacement

INC Ransomware has the ability to change the background wallpaper image to display the ransom note.[4][3]

EnterpriseT1140Deobfuscate/Decode Files or Information

INC Ransomware can runCryptStringToBinaryA to decrypt base64 content containing its ransom note.[4]

EnterpriseT1652Device Driver Discovery

INC Ransomware can verify the presence of specific drivers on compromised hosts including Microsoft Print to PDF and Microsoft XPS Document Writer.[4]

EnterpriseT1083File and Directory Discovery

INC Ransomware can receive command line arguments to encrypt specific files and directories.[4][1]

EnterpriseT1490Inhibit System Recovery

INC Ransomware can delete volume shadow copy backups from victim machines.[4]

EnterpriseT1570Lateral Tool Transfer

INC Ransomware can push its encryption executable to multiple endpoints within compromised infrastructure.[2]

EnterpriseT1680Local Storage Discovery

INC Ransomware can discover and mount hidden drives to encrypt them.[4]

EnterpriseT1106Native API

INC Ransomware can use the APIDeviceIoControl to resize the allocated space for and cause the deletion of volume shadow copy snapshots.[4]

EnterpriseT1135Network Share Discovery

INC Ransomware has the ability to check for shared network drives to encrypt.[4]

EnterpriseT1120Peripheral Device Discovery

INC Ransomware can identify external USB and hard drives for encryption and printers to print ransom notes.[4]

EnterpriseT1566Phishing

INC Ransomware campaigns have used spearphishing emails for initial access.[1]

EnterpriseT1057Process Discovery

INC Ransomware can use the Microsoft Win32 Restart Manager to kill processes with a specific handle or that are accessing resources it wants to encrypt.[4]

EnterpriseT1489Service Stop

INC Ransomware can issue a command to kill a process on compromised hosts.[4]

EnterpriseT1047Windows Management Instrumentation

INC Ransomware has the ability to use wmic.exe to spread to multiple endpoints within a compromised environment.[2][3]

Groups That Use This Software

IDNameReferences
G1032INC Ransom

[4][3]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp