Skip to content

S0575 Conti

Conti is a Ransomware-as-a-Service (RaaS) that was first observed in December 2019. Conti has been deployed via TrickBot and used against major corporations and government agencies, particularly those in North America. As with other ransomware families, actors using Conti steal sensitive files and information from compromised networks, and threaten to publish this data unless the ransom is paid.312

Item Value
ID S0575
Associated Names
Version 2.1
Created 17 February 2021
Last Modified 29 September 2022
Navigation Layer View In ATT&CK® Navigator

Techniques Used

Domain ID Name Use
enterprise T1059 Command and Scripting Interpreter -
enterprise T1059.003 Windows Command Shell Conti can utilize command line options to allow an attacker control over how it scans and encrypts files.15
enterprise T1486 Data Encrypted for Impact Conti can use CreateIoCompletionPort(), PostQueuedCompletionStatus(), and GetQueuedCompletionPort() to rapidly encrypt files, excluding those with the extensions of .exe, .dll, and .lnk. It has used a different AES-256 encryption key per file with a bundled RAS-4096 public encryption key that is unique for each victim. Conti can use “Windows Restart Manager” to ensure files are unlocked and open for encryption.31245
enterprise T1140 Deobfuscate/Decode Files or Information Conti has decrypted its payload using a hardcoded AES-256 key.31
enterprise T1083 File and Directory Discovery Conti can discover files on a local system.1
enterprise T1490 Inhibit System Recovery Conti can delete Windows Volume Shadow Copies using vssadmin.1
enterprise T1106 Native API Conti has used API calls during execution.31
enterprise T1135 Network Share Discovery Conti can enumerate remote open SMB network shares using NetShareEnum().14
enterprise T1027 Obfuscated Files or Information Conti can use compiler-based obfuscation for its code, encrypt DLLs, and hide Windows API calls.134
enterprise T1057 Process Discovery Conti can enumerate through all open processes to search for any that have the string “sql” in their process name.1
enterprise T1055 Process Injection -
enterprise T1055.001 Dynamic-link Library Injection Conti has loaded an encrypted DLL into memory and then executes it.31
enterprise T1021 Remote Services -
enterprise T1021.002 SMB/Windows Admin Shares Conti can spread via SMB and encrypts files on different hosts, potentially compromising an entire network.31
enterprise T1018 Remote System Discovery
Conti has the ability to discover hosts on a target network.4
enterprise T1489 Service Stop Conti can stop up to 146 Windows services related to security, backup, database, and email solutions through the use of net stop.1
enterprise T1016 System Network Configuration Discovery Conti can retrieve the ARP cache from the local system by using the GetIpNetTable() API call and check to ensure IP addresses it connects to are for local, non-Internet, systems.1
enterprise T1049 System Network Connections Discovery Conti can enumerate routine network connections from a compromised host.1
enterprise T1080 Taint Shared Content Conti can spread itself by infecting other remote machines via network shared drives.31

Groups That Use This Software

ID Name References
G0102 Wizard Spider 4