General
-
Target
8f1b0affffb2f2f58b477515d1ce54f4daa40a761d828041603d5536c2d53539
-
Size
79KB
-
Sample
210912-f4p6gscah5
-
MD5
de63e92d3c6735c5e31269678d2b9ea9
-
SHA1
6f430f0efe373e5e4cab9c48bcef14460b7b4796
-
SHA256
8f1b0affffb2f2f58b477515d1ce54f4daa40a761d828041603d5536c2d53539
-
SHA512
9d33340004965a97e56bfb02adb9bb575acc349021ff306c18f7d3d9792a518ee48ab0e09a1bd82346cb1a4d59e3f9baf66797a4612a2ce304f0b83fe94a6993
Static task
static1
Behavioral task
behavioral1
Sample
8f1b0affffb2f2f58b477515d1ce54f4daa40a761d828041603d5536c2d53539.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
8f1b0affffb2f2f58b477515d1ce54f4daa40a761d828041603d5536c2d53539.exe
Resource
win10-en
Malware Config
Extracted
blackmatter
2.0
506d1d0f4ed51ecc3e9cf1839a4b21a7
-
attempt_auth
false
-
create_mutex
false
-
encrypt_network_shares
true
-
exfiltrate
false
-
mount_volumes
true
Extracted
C:\1rWCqamCt.README.txt
blackmatter
http://supp24maprinktc7uizgfyqhisx7lkszb6ogh6lwdzpac23w3mh4tvyd.onion/6O5KBMY42CFGLLU7L2MW4
Targets
-
-
Target
8f1b0affffb2f2f58b477515d1ce54f4daa40a761d828041603d5536c2d53539
-
Size
79KB
-
MD5
de63e92d3c6735c5e31269678d2b9ea9
-
SHA1
6f430f0efe373e5e4cab9c48bcef14460b7b4796
-
SHA256
8f1b0affffb2f2f58b477515d1ce54f4daa40a761d828041603d5536c2d53539
-
SHA512
9d33340004965a97e56bfb02adb9bb575acc349021ff306c18f7d3d9792a518ee48ab0e09a1bd82346cb1a4d59e3f9baf66797a4612a2ce304f0b83fe94a6993
Score10/10-
BlackMatter Ransomware
BlackMatter ransomware group claims to be Darkside and REvil succesor.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-