Conti Ransomware affiliate leaks gang Playbook

On 5 August 2021, a forum user identified as m1Geelka, leaked an archive of the Conti gang's manual and technical guides in the hacking forum XSS.is. It seemed that the user was an affiliate to Conti Gang and leaked the files due to a salary dispute.

m1Geelka stating how Conti Gang splits the rewards from their victims
Link shared by m1Geelka

Conti Ransomware Gang

  1. First discovered in December 2019, and started operating as a personal ransomware-as-a-service (RaaS) model in July 2020.
  2. Likely to be operated with the same operators that conducted Ryuk ransomware attacks in the past (source: CarbonBlack).
  3. Victims are high value targets in many Medical sectors (U.S. Health Emergency Networks, Ireland Health Service Executive)
  4. Recorded Techniques from MITRE ATT&CK.

Leaked files at a glance

The leaked archive was titled, Мануали для работяг и софт.rar (roughly translated to Manuals for hard workers and software.rar) and contains 51 files in total. The archive included instructions to use a range of applications to aid in their attacks such as net scanners, proxifiers,RDP software, configuring and using Cobalt Strike, how to perform privilege escalation, how to dump credentials, how to perform brute-forcing, using ZeroLogon or Kerberoasting, deleting shadow copies, performing data exfiltration, and more.

Snapshot of leaked archive

Certain archives are password protected but the community had managed to crack them.

Original Filename Translated Filename Remarks
AV.7z AV.7z Contains scripts to help disable AV
ad_users.txt ad_users.txt Instructions to hunt for specific users using Powerview.
CS4.3_Clean ahsh4veaQu .7z CS4.3_Clean ahsh4veaQu .7z Cobalt Strike builds
DAMP NTDS.txt DAMP NTDS.txt Instructions to dump Windows NT Directory Services (NTDS)
domains.txt domains.txt List of hostnames
enhancement-chain.7z enhancement-chain.7z Set of Cobalt Strike scripts written by mgeeky. Comes with a custom README
Kerber-ATTACK.rar Kerber-ATTACK.rar Steps to perform Kerberoasting
NetScan.txt NetScan.txt Instructions to use NetScan software
p.bat p.bat Ping to hosts listed in domains.txt
PENTEST SQL.txt PENTEST SQL.txt link to PowerUpSQL
ProxifierPE.zip ProxifierPE.zip Proxy tool to route network traffic
RDP NGROK.txt RDP NGROK.txt Instructions to setup NGROK to perform secure RDP
RMM_Client.exe RMM_Client.exe Remote Monitoring and Management Client
Routerscan.7z Routerscan.7z Contains RouterScan by Stas'M
RouterScan.txt RouterScan.txt Instructions to use RouterScan to scan and identify routers, internet cameras and attempt to bruteforce exploit to gain access
SQL DAMP.txt SQL DAMP.txt SQL queries to query specific SQL data
Аллиасы для мсф.rar Alliases for msf.rar Assign alias for metasploit modules
Анонимность для параноиков.txt Anonymity for the paranoid.txt Advices from Conti Gang for its 'paranoid' operators in staying anonymous
ДАМП LSASS.txt DUMP LSASS.txt Methods to dump LSASS
Если необходимо отсканить всю сетку одним листом.txt If you need to scan the entire grid in one sheet. Txt Instructions to use AdFind to enumerate the internal network
Закреп AnyDesk.txt Fix AnyDesk.txt Instructions to download and install AnyDesk on victim as a form of persistency
Заменяем sorted адфиндера.txt Replace sorted adfinder.txt Seems to be adding and running a Cobalt Strike Beacon in Scheduled Tasks
КАК ДЕЛАТЬ ПИНГ (СЕТИ).txt HOW TO PING (NETWORK) .txt Instructions to create custom domains.txt that stores a list of hostnames/domains and using p.bat to execute ping against domains.txt.
КАК ДЕЛАТЬ СОРТЕД СОБРАННОГО АД!!!!.txt HOW TO MAKE SORT OF COLLECTED HELL !!!!. Txt Instructions to setup tor network and Filezilla for data exfiltration purposes
КАК И КАКУЮ ИНФУ КАЧАТЬ.txt HOW AND WHAT INFO TO DOWNLOAD.txt Instructions on common files to look for and how to exfiltrate them using Rclone.
КАК ПРЫГАТЬ ПО СЕССИЯМ С ПОМОЩЬЮ ПЕЙЛОАД.txt HOW TO JUMP SESSIONS USING PAYLOAD.txt Seems like instructions to send the established session to Cobalt Strike.
Личная безопасность.txt Personal Safety.txt Instructions for operators to encrypt their VM storage using VeraCrypt before using it for their operations.
МАНУАЛ.txt MANUAL.txt Instructions to perform discovery and enumeration
Мануал робота с AD DC.txt Robot manual with AD DC.txt A set of instructions to perform discovery and enumeration with open source tools and scripts
Меняем RDP порт.txt Change RDP port.txt Commands to change RDP ports
ОТКЛЮЧЕНИЕ ДЕФЕНДЕРА ВРУЧНУЮ.txt DISABLING THE DEFENDER MANUALLY.txt Instructions to disable WinDefender
параметр запуска локера на линукс версиях.txt locker launch parameter on linux versions.txt Usage of Locker malware (?) on linux systems
ПЕРВОНАЧАЛЬНЫЕ ДЕЙСТВИЯ.txt INITIAL STEPS.txt Lists steps to take when after getting initial access
ПОВИЩЕНИЯ ПРИВИЛЕГИЙ.txt VENTURE OF PRIVILEGES.txt Link to repository for AD exploitation
поднятие прав (дефолт).txt elevation of rights (default) .txt Instructions to escalate privileges using Cobalt Strike(similar to msf's getsystem)
Получение доступа к серверу с бекапами Shadow Protect SPX (StorageCraft).txt Gaining access to the server with backups Shadow Protect SPX (StorageCraft) .txt Instructions to gain access to victim backups using Shadow Protect SPX by StorageCraft
по отключению дефендера.txt to disable defender.txt Another set of method to disable WinDefender
ПРОСТАВЛЕНИЕ.txt PROSTITION.txt Commands to copy/run file as Domain Admin using PsExec or WMIC
Рабочая станция на работу через Tor сетїь.txt Workstation to work through the Tor network.txt Instructions to have the operators' workstations to tunnel Through Tor network.
Рабочий скрипт создания VPS сервера для тестирования на проникноваение от A до Z.txt Working script for creating a VPS server for penetration testing from A to Z.txt Link to tutorial to setup a Virtual Private Server
рклон.zip rclone.zip Rclone executable and configuration instructions
Сайт создание батникоd.txt Website creation batnikod.txt A link to a strings formatter
Скрипт для sorted .rar Script for sorted .rar Script to map ad_users to ad_computers.
СМБ АВТОБРУТ.txt SMB AUTOBRUT.txt Instructions to bruteforce passwords using Cobalt Strike
СНЯТИЕ-AD.rar REMOVAL-AD.rar AdFind executable and set of default commands to use for enumeration
Список ТГ форумов, много интересного.txt List of TG forums, many interesting things.txt List of interesting Telegram Groups for hacking
Установка метасплойт на впс.txt Installing metasploit on vps.txt Instructions to install MSF on VPS
хантинг админов, прошу ознакомиться, очень полезно!!.txt hunting admins, please read, very useful !!. txt Instructions on how to hunt for admins in the network. (The text contained french on top of russian.. interesting..)
Эксплуатация CVE-2020-1472 Zerologon в Cobalt Strike.txt Exploiting CVE-2020-1472 Zerologon at Cobalt Strike.txt Instructions to use ZeroLogon exploit in Cobalt Strike.
это установка армитажа. ставится поверх Metasploit this is an armitage installation. put on top of Metasploit Instructions to install Armitage

Cobalt Strike Manuals V2

In other articles, there seemed to be a manual included which I wasn't able to find in the archive I obtained. However, the people from OALabs translated the manual and streamed their discussion live.

Snippet of the translated manual

The manual records the Conti Gang's TTP on their victims, beginning from selecting their targets. The manual does not include how they get their targets to fall for their attack, but it is likely SpearPhishing, based on other reports. Some terms that frequently appeared whilst going through the data were the terms wheelbarrow and ball. Inferring from context, it seems that wheelbarrow translates to shell/cmd and ball translates to file share\ directory.

For technical analysis on Conti Gang's past attacks, you may visit MITRE ATT&CK, Carbon Black, DFIR, Sophos and Cybereason.

Conclusion

Keeping an organisation's data secure comes from multiple angles. Users should practice good cyber hygiene such as proper data handling, adhering to strong password practices, etc. And the organisation should lay policies and rules to enforce these practices. But of course, the dilemma is balancing productivity/ efficiency against security. However, is an organisation really ready to accept the risk?