Clop is a ransomware family that was first observed in February 2019 and has been used against retail, transportation and logistics, education, manufacturing, engineering, automotive, energy, financial, aerospace, telecommunications, professional and legal services, healthcare, and high tech industries. Clop is a variant of the CryptoMix ransomware.[1][2][3]
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1059 | .003 | Command and Scripting Interpreter: Windows Command Shell |
Clop can use cmd.exe to help execute commands on the system.[2] |
Enterprise | T1486 | Data Encrypted for Impact |
Clop can encrypt files using AES, RSA, and RC4 and will add the ".clop" extension to encrypted files.[1][3][2] |
|
Enterprise | T1140 | Deobfuscate/Decode Files or Information | ||
Enterprise | T1083 | File and Directory Discovery |
Clop has searched folders and subfolders for files to encrypt.[1] |
|
Enterprise | T1562 | .001 | Impair Defenses: Disable or Modify Tools | |
Enterprise | T1490 | Inhibit System Recovery |
Clop can delete the shadow volumes with |
|
Enterprise | T1112 | Modify Registry | ||
Enterprise | T1106 | Native API |
Clop has used built-in API functions such as WNetOpenEnumW(), WNetEnumResourceW(), WNetCloseEnum(), GetProcAddress(), and VirtualAlloc().[1][2] |
|
Enterprise | T1135 | Network Share Discovery | ||
Enterprise | T1027 | .002 | Obfuscated Files or Information: Software Packing | |
Enterprise | T1057 | Process Discovery |
Clop can enumerate all processes on the victim's machine.[1] |
|
Enterprise | T1489 | Service Stop |
Clop can kill several processes and services related to backups and security solutions.[3][1] |
|
Enterprise | T1218 | .007 | Signed Binary Proxy Execution: Msiexec |
Clop can use msiexec.exe to disable security tools on the system.[2] |
Enterprise | T1518 | .001 | Software Discovery: Security Software Discovery |
Clop can search for processes with antivirus and antimalware product names.[1][2] |
Enterprise | T1553 | .002 | Subvert Trust Controls: Code Signing | |
Enterprise | T1614 | .001 | System Location Discovery: System Language Discovery |
Clop has checked the keyboard language using the GetKeyboardLayout() function to avoid installation on Russian-language or other Commonwealth of Independent States-language machines; it will also check the |
Enterprise | T1497 | .003 | Virtualization/Sandbox Evasion: Time Based Evasion |
Clop has used the |
ID | Name | References |
---|---|---|
G0092 | TA505 |