Conti Ransomware: Behavior and Techniques

Introduction

Call to IsDebuggerPresent WIN API * Call to IsDebuggerPresent WIN API*

BeingDebugged flag (offset 0x2) inspection

XOR decription

The Microsoft Windows native CRYPTSP API is used to generate a different encryption key per file, with an RSA-4096 public encryption key unique for each victim. The ".mabdg" file extension is added to the encrypted files. In each traversed directory, the malware writes the ransom note named ‘readme.txt’ shown below.

Conclusion

limit
3