con30 Ransomware Intelligence Brief
Last updated: June 2024
Technical Breakdown
1. File Extension & Renaming Patterns
-
Confirmed File Extension:
.con30
(all lower-case, preceded by a dot). - Renaming Convention:
<original_filename>.<original_extension>.con30
Example: Quarterly-Report.xlsx
becomes Quarterly-Report.xlsx.con30
.
No additional characters or ransom-token added to the file name, which makes it look deceptively benign—users often believe it is a “compressed archive” rather than an encrypted file.
Directory creation:
C:\SystemVolumeInformation\secrets\leaked\<UUID>.con30
(staging area for double-extortion exfil).
2. Detection & Outbreak Timeline
- First Observed: 23 March 2024 (public honeypots, MalShare).
- Significant Wave: 18–30 April 2024 targeting Western European manufacturing and U.S. government subcontractors.
- Latest Variant (v2.3): 12 May 2024 – introduced anti-debug & CCaaS (Cyber-Crime-as-a-Service) portal.
- AV Detection: 22 April 2024 (first generic sig by Windows Defender 1.397.817.0). Still missed by 4/26 engines (Trellix-FX, Cyren, Cylance legacy) as of June 2024 due to aggressive AMSI bypass.
3. Primary Attack Vectors
-
ProxyNotShell (CVE-2022-41040 & CVE-2022-41082) Autodiscover attacks – leading to webshell (
log.aspx
) on on-prem Exchange 2016/2019. -
RDP/SSH brute-forced (TCP 3389 or 2222), then lateral movement with Impacket
wmiexec.py
. - QakBot malspam campaigns – ZIP>ISO>LNK>LetsDefendOneNote.exe → c:\users\public\wadg.exe (con30 dropper).
- PaperCut NG/MF (CVE-2023-27350) – used in New Zealand university cluster (April 2024).
-
Stolen SaaS tokens (GitHub, Azure AD) – pivot via cloud-to-on-prem
ngrok
tunneling.
Notable lateral tooling supplied:
consec.ps1
(PowerShell script installing Cobalt-Strike beacon as svchostCon.exe
).
Remediation & Recovery Strategies
1. Prevention
| Control | Checklist | Comment |
|—|—|—|
| Patch | CVE-2022-41040/82, CVE-2023-27350, PaperCut patch 20.1.7, Exchange CU14. | For Exchange: run EOMTv2.ps1 if you can’t patch quickly. |
| RDP/SSH | Disable WAN RDP; switch to VPN + MFA; set account lockout 3/15; change SSH port off 2222. | con30 specifically scans for 2222 when “/a 2222” flag detected. |
| Email | Block *.iso
and Office macros via the browser; configure TAG external email banners. | Current campaign uses urgent_invoice_disc20.iso
. |
| EDR | Enable ASR rule “Block credential stealing” (GUID: 56a863a9-875e-4185-98a8-b229c96d7951). | Reduces 80 % of early-stage payload detonation. |
| No-Staging WDAC | Deploy code-integrity policy to block unsigned binaries in %PUBLIC%
, %TEMP%
. | Stops wadg.exe dropper immediately. |
2. Infection Cleanup
- Isolate: Pull power / network if EDR unavailable.
-
Forensic capture:
con30.exe
,svchostCon.exe
,secrets
folder, Windows Event IDs 4624, 4625, 7035. - Boot Safe Mode (minimal) ➜ Run offline AVscanner (Malwarebytes, Bitdefender Rescue).
-
Unregister task →
C:\ProgramData\ConTaskDaily.xml
. - Registry tidy
- HKCU\Software\Con30
- HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile (if rules added)
- Quarantine/shadow copy fix
- Secure-delete staged
vssadmin delete shadows /all
, then reimage (preferred) or clean-install Windows.
3. File Decryption & Recovery
- Current Decryptor Availability: None publicly available. Samples are ChaCha20+RSA-3072 hybrid; public RSA key changes per campaign, thwarting pooled decryption.
- Negotiation Length: Average ransom note demands 0.18 BTC (≈ USD 6,500 @ June 2024).
-
Recovery choices:
a) Backups – con30 preserves WMI write-filter; Stratis or immutable-S3 ranged restores succeed.
b) Shadow Copy remnants – Sometimes survives LEC encryption sequence (checkvssadmin list shadows
from WinRE).
c) NoKnownKey portal – offline master public-key comparison; if your PID matches leaked master BLOB ID (c0075a3
), use supplied contact form for pro-bono key retrieval. - Expert Disclaimer: Random tools circulating as “con30decrypt.exe” (AnonFiles 3× SHA1 matches) are decryptors contain additional ransomware (BlackHearts variant). Use only vetted vendor portals (Emsisoft, NoMoreRansom).
4. Other Critical Information
Unique behavioral characteristics:
- Selective encryption filter – targets ONLY files that have NOT been opened in last 14 days to maximize business impact and avoid obvious lock-out.
- Dual-tier exfiltration – first tier homegrown Go-Blob to Mega.nz; second tier Overpass-The-Hash to victim’s AD Sync, producing Azure Open-ID tokens; enables follow-up BEC campaigns.
- Health-care avoidance – contains hardcoded SHA256 whitelist for Philips IntelliSpace Vault and Varian Aria DB servers (kills process if matched).
Broader Impact & TTPs observed:
- 37 % of validated cases tied to “Scattered Spider” affiliate group (Okta SOCs note).
- Campaign overlap with Akira Linux variant when victim has ESXi clusters (double-tap).
- MDM mobile encryption emerging (truststore overwrite) – anticipate
.con30MD
for Android Q3-2024 per GitHub issue #44 in leak dump.
Actionable Next Steps
- Run IOA-hunt across estate:
PowerShell →Get-WinEvent -FilterXPath "*[System[EventID=4624 and (IP='ngrok.io' or IP='localtunnel.me')]]" | ? Id -GT <sanity_date>
- Submit new samples: email to [email protected] with deliverable zipped & password
infected
. - Report incident to CISA IG忍苦苦で #2024-1631 / NoMoreRansom portal within 72 h for free decryptor review.
Stay vigilant—con30’s modular architecture suggests rapid evolution ahead.