top of page

Conti

Name

Category

Type

Targeted OS

Description

Information

Conti

Malware

Ransomware
Big Game Hunting

Windows

(Carbon Black) Conti uses a large number of independent threads to perform encryption, allowing up to 32 simultaneous encryption efforts, resulting in faster encryption compared to many other families.

Conti also utilizes command line options to allow for control over how it scans for data, suggesting that the malware may commonly be spread and directly controlled by an adversary. This control introduces the novel ability of skipping the encryption of local files and only targeting networked SMB shares, including those from IP addresses specifically provided by the adversary. This is a very rare ability that�s previously been seen with the Sodinokibi ransomware family.

Another new technique, documented in very few ransomware families, is the use of the Windows Restart Manager to ensure that all files can be encrypted. Just as Windows will attempt to cleanly shut down open applications when the operating system is rebooted, the ransomware will utilize the same functionality to cleanly close the application that has a file locked. By doing so, the file is freed up for encryption.

Malpedia

Alienvault OTX

Playbook

CISA

Other Information

Mitre

Mitre Techniques

Mitre Techniques  Navigator Link

NIL

NIL

['T1059', 'T1486', 'T1140', 'T1083', 'T1490', 'T1106', 'T1135', 'T1027', 'T1057', 'T1055', 'T1021', 'T1018', 'T1489', 'T1016', 'T1049', 'T1080']

bottom of page