Conti is a Ransomware-as-a-Service (RaaS) that was first observed in December 2019. Conti has been deployed via TrickBot and used against major corporations and government agencies, particularly those in North America. As with other ransomware families, actors using Conti steal sensitive files and information from compromised networks, and threaten to publish this data unless the ransom is paid.[1][2][3]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1140 | 反混淆/解码文件或信息 |
Conti has decrypted its payload using a hardcoded AES-256 key.[1][2] |
|
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell |
Conti can utilize command line options to allow an attacker control over how it scans and encrypts files.[2][4] |
| Enterprise | T1486 | 数据加密以实现影响 |
Conti can use |
|
| Enterprise | T1083 | 文件和目录发现 | ||
| Enterprise | T1489 | 服务停止 |
Conti can stop up to 146 Windows services related to security, backup, database, and email solutions through the use of |
|
| Enterprise | T1106 | 本机API | ||
| Enterprise | T1080 | 污染共享内容 |
Conti can spread itself by infecting other remote machines via network shared drives.[1][2] |
|
| Enterprise | T1027 | 混淆文件或信息 |
Conti can use compiler-based obfuscation for its code, encrypt DLLs, and hide Windows API calls.[2][1][5] |
|
| Enterprise | T1490 | 系统恢复抑制 |
Conti can delete Windows Volume Shadow Copies using |
|
| Enterprise | T1049 | 系统网络连接发现 |
Conti can enumerate routine network connections from a compromised host.[2] |
|
| Enterprise | T1016 | 系统网络配置发现 |
Conti can retrieve the ARP cache from the local system by using the |
|
| Enterprise | T1135 | 网络共享发现 |
Conti can enumerate remote open SMB network shares using |
|
| Enterprise | T1057 | 进程发现 |
Conti can enumerate through all open processes to search for any that have the string "sql" in their process name.[2] |
|
| Enterprise | T1055 | .001 | 进程注入: Dynamic-link Library Injection |
Conti has loaded an encrypted DLL into memory and then executes it.[1][2] |
| Enterprise | T1021 | .002 | 远程服务: SMB/Windows Admin Shares |
Conti can spread via SMB and encrypts files on different hosts, potentially compromising an entire network.[1][2] |
| Enterprise | T1018 | 远程系统发现 |
Conti has the ability to discover hosts on a target network.[5] |
|
| ID | Name | References |
|---|---|---|
| G0102 | Wizard Spider |