General
-
Target
86c84c07e27cc8aba129e1cf51215b65c445f178b94f2e8c4c10e6bc110daa94
-
Size
73KB
-
Sample
210809-x8rgp9n332
-
MD5
01aef1c692a50a9d0e0369a58b1516ff
-
SHA1
8572344f5320d4b9ea4c03c37409210a290540c0
-
SHA256
86c84c07e27cc8aba129e1cf51215b65c445f178b94f2e8c4c10e6bc110daa94
-
SHA512
abbd643dfcc25bc68983ff1c572824cfd1a2f44eff3f37c22450041aa2de31bdaace6996c55e2371040f479a9b5364bbcfbc41d6bc48e364a0433bb76e7b6f72
Static task
static1
Behavioral task
behavioral1
Sample
86c84c07e27cc8aba129e1cf51215b65c445f178b94f2e8c4c10e6bc110daa94.dll
Resource
win7v20210410
Behavioral task
behavioral2
Sample
86c84c07e27cc8aba129e1cf51215b65c445f178b94f2e8c4c10e6bc110daa94.dll
Resource
win10v20210410
Malware Config
Extracted
blackmatter
1.6
0c6ca0532355a106258791f50b66c153
-
attempt_auth
false
-
create_mutex
false
-
encrypt_network_shares
false
-
exfiltrate
false
-
mount_volumes
true
Extracted
C:\oSPvdHTvI.README.txt
blackmatter
http://supp24maprinktc7uizgfyqhisx7lkszb6ogh6lwdzpac23w3mh4tvyd.onion/RSW33BDOYPLWM78U9A09BZDI
Targets
-
-
Target
86c84c07e27cc8aba129e1cf51215b65c445f178b94f2e8c4c10e6bc110daa94
-
Size
73KB
-
MD5
01aef1c692a50a9d0e0369a58b1516ff
-
SHA1
8572344f5320d4b9ea4c03c37409210a290540c0
-
SHA256
86c84c07e27cc8aba129e1cf51215b65c445f178b94f2e8c4c10e6bc110daa94
-
SHA512
abbd643dfcc25bc68983ff1c572824cfd1a2f44eff3f37c22450041aa2de31bdaace6996c55e2371040f479a9b5364bbcfbc41d6bc48e364a0433bb76e7b6f72
Score10/10-
BlackMatter Ransomware
BlackMatter ransomware group claims to be Darkside and REvil succesor.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-