{
	"id": "750668fe-12d9-47a4-a7e5-4d1c76391625",
	"created_at": "2026-04-06T00:11:45.351832Z",
	"updated_at": "2026-04-10T03:21:18.351335Z",
	"deleted_at": null,
	"sha1_hash": "a33c7c86835739a9ef43efa8ca41d174c39beedb",
	"title": "Conti Unpacked: Understanding Ransomware Development as a Response to Detection – a Detailed Technical Analysis",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 29726,
	"plain_text": "Conti Unpacked: Understanding Ransomware Development as a\r\nResponse to Detection – a Detailed Technical Analysis\r\nBy Author:\r\nArchived: 2026-04-05 12:53:41 UTC\r\n1CO N T I U N PAC K E D : U N D E R STA N D I N G R A N S O M WA R E D E V E LO P M E N T AS A\r\nR E S P O N S E TO D E T E C T I O N — A D E TA I L E D T E C H N I C A L A N A LYS I S\r\nCONTI UNPACKED:\r\nUNDERSTANDING RANSOMWARE\r\nDEVELOPMENT AS A RESPONSE\r\nTO DETECTION – A DETAILED\r\nTECHNICAL ANALYSIS\r\nAuthors: Idan Weizman, Antonio Pirozzi July 2021 SentinelLABS Research Team\r\nSource: https://assets.sentinelone.com/ransomware-enterprise/conti-ransomware-unpacked\r\nhttps://assets.sentinelone.com/ransomware-enterprise/conti-ransomware-unpacked\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"references": [
		"https://assets.sentinelone.com/ransomware-enterprise/conti-ransomware-unpacked"
	],
	"report_names": [
		"conti-ransomware-unpacked"
	],
	"threat_actors": [],
	"ts_created_at": 1775434305,
	"ts_updated_at": 1775791278,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/a33c7c86835739a9ef43efa8ca41d174c39beedb.pdf",
		"text": "https://archive.orkl.eu/a33c7c86835739a9ef43efa8ca41d174c39beedb.txt",
		"img": "https://archive.orkl.eu/a33c7c86835739a9ef43efa8ca41d174c39beedb.jpg"
	}
}