@OALABS
  @OALABS
OALabs | Leaked Conti Ransomware Playbook - Red Team Reacts @OALABS | Uploaded 3 years ago | Updated 2 hours ago
Red Team reacts to leaked Conti hacking handbook. These techniques actually work?! How can we defend against them? Expand for more...

-----
OALABS DISCORD
discord.gg/6h5Bh5AMDU

OALABS PATREON
patreon.com/oalabs

OALABS TIP JAR
ko-fi.com/oalabs

OALABS GITHUB
github.com/OALabs

UNPACME - AUTOMATED MALWARE UNPACKING
unpac.me/#

-----

Big thanks to Rob for his RedTeam perspective twitter.com/m0rv4i

More info on detection including IOCs:
labs.nettitude.com/blog/detecting-poshc2-indicators-of-compromise

Also thanks to twitter.com/James_inthe_box for the translated document:
github.com/silence-is-best/files/blob/main/translate_f.pdf

Interesting reports on the Conti kill chain from DFIR Report:
thedfirreport.com/2021/05/12/conti-ransomware
thedfirreport.com/2021/08/01/bazarcall-to-conti-ransomware-via-trickbot-and-cobalt-strike

Feedback, questions, and suggestions are always welcome : )


Sergei twitter.com/herrcore
Sean twitter.com/seanmw


As always check out our tools, tutorials, and more content over at openanalysis.net
Leaked Conti Ransomware Playbook  - Red Team ReactsUnpacking Process Injection Malware With IDA PRO (Part 2)IDA Pro Automated String Decryption For REvil RansomwareWhat is The Future of Reverse Engineering [ Reverse Engineering AMA ]Advantages Of Intermediate Language (IL) Over Pseudo C Code [ Reverse Engineering AMA ]PE File Unmapping Explained aka Lazy Process DumpingTips For Writing a .NET Static Config Extractor for Malware [ Reverse Engineering AMA ]Reverse Engineering C++ Malware With IDA ProIDA Pro Plugins For Malware Reverse EngineeringDebugging shellcode using BlobRunner and IDA ProIDA Pro Malware Analysis TipsSandbox Tricks For Faster Reverse Engineering

Leaked Conti Ransomware Playbook - Red Team Reacts @OALABS

SHARE TO X SHARE TO REDDIT SHARE TO FACEBOOK WALLPAPER