Rewterz Threat Alert – Hancitor InfoStealer – Active IOCs
November 24, 2021Rewterz Threat Alert – Donot APT Group – Active IOCs
November 25, 2021Rewterz Threat Alert – Hancitor InfoStealer – Active IOCs
November 24, 2021Rewterz Threat Alert – Donot APT Group – Active IOCs
November 25, 2021Severity
High
Analysis Summary
A new ransomware family packs multiple unique features, including improving performance and give its operators the option to only target networked SMB shares. Dubbed Conti, the malware improves performance through the use of “up to 32 simultaneous encryption efforts,” and is likely directly controlled by its operators, which means that it can target network-based resources and skip local files, similarly with what the Sodinokibi ransomware can do. the new ransomware abuses the Windows Restart Manager to close applications that lock certain files, thus making sure it can encrypt all the data it wants. The notable effect of this capability is that it can cause targeted damage in an environment in a method that could frustrate incident response activities. A successful attack may have destruction that’s limited to the shares of a server that has no Internet capability, but where there is no evidence of similar destruction elsewhere in the environment.
Impact
- File Encryption
Indicators of Compromise
SHA-256
- acf617084b3ae2f5119c8435330537377a72d75a1e655d341967345621092396
- 340c577f6b2680e50131e55666bac5fe5cf4cad3918fd9a69315cddedf545d1a
- b1a83f07e5d5d4c356f5cb8b9bfe36f7bc3a2915a5c0cb5dbc2193afa57fe9c2
- 7c89764390dcf29c19e610e4eda9a8d0f71a805a9c828517e24c46ae33007dea
Remediation
- Block all threat indicators at your respective controls.
- Search for IOCs in your environment.