General
-
Target
cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample
-
Size
79KB
-
Sample
210920-pyx4ksgggj
-
MD5
18b2fb7ecd32c80dc111eabfd58fc575
-
SHA1
d91e95182e554b7eb39b20c7876b610c15bcac1a
-
SHA256
cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163
-
SHA512
44b43b8409de6a5827cb789261518c6d916c244599ea42e6b04965e4da8e5463e2bd70f80a444a2dfc5fd6b459f52c5023b2fd080aa8fbb1eea8f6d521071ad3
Static task
static1
Behavioral task
behavioral1
Sample
cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe
Resource
win7-en-20210916
Behavioral task
behavioral2
Sample
cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe
Resource
win10v20210408
Malware Config
Extracted
blackmatter
2.0
b8726db5d916731db5625cfc30c4f7d9
-
attempt_auth
false
-
create_mutex
false
-
encrypt_network_shares
true
-
exfiltrate
false
-
mount_volumes
true
Extracted
C:\SykSKioSK.README.txt
blackmatter
http://supp24maprinktc7uizgfyqhisx7lkszb6ogh6lwdzpac23w3mh4tvyd.onion/5PBOYRSETHVDBDPTL
Targets
-
-
Target
cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample
-
Size
79KB
-
MD5
18b2fb7ecd32c80dc111eabfd58fc575
-
SHA1
d91e95182e554b7eb39b20c7876b610c15bcac1a
-
SHA256
cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163
-
SHA512
44b43b8409de6a5827cb789261518c6d916c244599ea42e6b04965e4da8e5463e2bd70f80a444a2dfc5fd6b459f52c5023b2fd080aa8fbb1eea8f6d521071ad3
Score10/10-
BlackMatter Ransomware
BlackMatter ransomware group claims to be Darkside and REvil succesor.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-