General
-
Target
e4fd947a781611c85ea2e5afa51b186de7f351026c28eb067ad70028acd72cda
-
Size
72KB
-
Sample
210817-drbmm9bm4x
-
MD5
3317daace715dc332622d883091cf68b
-
SHA1
02fa74523198ebc1db490bdc6f10a78a44c4e28b
-
SHA256
e4fd947a781611c85ea2e5afa51b186de7f351026c28eb067ad70028acd72cda
-
SHA512
2739769ddd079b6555ebb84204f46bf94317ef5351734bd2aad74b1ad53738f92e3e278ea74b22f9b17db2219e01c963e694e6e1aec52a6089eaba394ef331b2
Static task
static1
Behavioral task
behavioral1
Sample
e4fd947a781611c85ea2e5afa51b186de7f351026c28eb067ad70028acd72cda.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
e4fd947a781611c85ea2e5afa51b186de7f351026c28eb067ad70028acd72cda.exe
Resource
win10v20210408
Malware Config
Extracted
blackmatter
1.6
0c6ca0532355a106258791f50b66c153
-
attempt_auth
false
-
create_mutex
false
-
encrypt_network_shares
true
-
exfiltrate
false
-
mount_volumes
true
Extracted
C:\UCzUExPUL.README.txt
blackmatter
http://supp24maprinktc7uizgfyqhisx7lkszb6ogh6lwdzpac23w3mh4tvyd.onion/RSW33BDOYPLWM78U9A09BZDI
Targets
-
-
Target
e4fd947a781611c85ea2e5afa51b186de7f351026c28eb067ad70028acd72cda
-
Size
72KB
-
MD5
3317daace715dc332622d883091cf68b
-
SHA1
02fa74523198ebc1db490bdc6f10a78a44c4e28b
-
SHA256
e4fd947a781611c85ea2e5afa51b186de7f351026c28eb067ad70028acd72cda
-
SHA512
2739769ddd079b6555ebb84204f46bf94317ef5351734bd2aad74b1ad53738f92e3e278ea74b22f9b17db2219e01c963e694e6e1aec52a6089eaba394ef331b2
Score10/10-
BlackMatter Ransomware
BlackMatter ransomware group claims to be Darkside and REvil succesor.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-