General
-
Target
20742987e6f743814b25e214f8b2cd43111e2f60a8856a6cca87cafd85422f41.bin.sample
-
Size
78KB
-
Sample
210921-qk3ycahfc2
-
MD5
7b125a148ce0e0c126b95395dbf02b0e
-
SHA1
778f954480ca76029109fd6bf34904bfb1109e84
-
SHA256
20742987e6f743814b25e214f8b2cd43111e2f60a8856a6cca87cafd85422f41
-
SHA512
daaeb7e228a3d5c7717c58287539902e79215d9795dcb1459213f7d515392f53f16ac2f0d455e635e89addd321f4f68ccdad9f5af60f8f4d1759b7ddf5409cf9
Static task
static1
Behavioral task
behavioral1
Sample
20742987e6f743814b25e214f8b2cd43111e2f60a8856a6cca87cafd85422f41.bin.sample.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
20742987e6f743814b25e214f8b2cd43111e2f60a8856a6cca87cafd85422f41.bin.sample.exe
Resource
win10-en-20210920
Malware Config
Extracted
Family |
blackmatter |
Version |
2.0 |
Botnet |
5791ae39aeab40b5e8e33d8dce465877 |
Attributes |
attempt_auth false
create_mutex true
encrypt_network_shares true
exfiltrate false
mount_volumes true |
rsa_pubkey.base64 |
|
aes.base64 |
|
Extracted
Path |
C:\chkvc3MvG.README.txt |
Family |
blackmatter |
Ransom Note | ~+ * + ' BLACK | () .-.,='``'=. - o - '=/_ \ | * | '=._ | \ `=./`, ' . '=.__.=' `=' * + Matter + O * ' . >>> What happens? Your network is encrypted, and currently not operational. We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data. >>> What data stolen? From your network was stolen 50 GB of data. If you do not contact us we will publish all your data in our blog and will send it to the biggest mass media. Blog post link: %BLOG_URL% >>> What guarantees? We are not a politically motivated group and we do not need anything other than your money. If you pay, we will provide you the programs for decryption and we will delete your data. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. We always keep our promises. >> How to contact with us? 1. Download and install TOR Browser (https://www.torproject.org/). 2. Open http://supp24maprinktc7uizgfyqhisx7lkszb6ogh6lwdzpac23w3mh4tvyd.onion/LEOYRMQLSRHFGFGYWF2T5 >> Warning! Recovery recommendations. We strongly recommend you to do not MODIFY or REPAIR your files, that will damage them. |
URLs |
http://supp24maprinktc7uizgfyqhisx7lkszb6ogh6lwdzpac23w3mh4tvyd.onion/LEOYRMQLSRHFGFGYWF2T5 |
Targets
-
-
Target
20742987e6f743814b25e214f8b2cd43111e2f60a8856a6cca87cafd85422f41.bin.sample
-
Size
78KB
-
MD5
7b125a148ce0e0c126b95395dbf02b0e
-
SHA1
778f954480ca76029109fd6bf34904bfb1109e84
-
SHA256
20742987e6f743814b25e214f8b2cd43111e2f60a8856a6cca87cafd85422f41
-
SHA512
daaeb7e228a3d5c7717c58287539902e79215d9795dcb1459213f7d515392f53f16ac2f0d455e635e89addd321f4f68ccdad9f5af60f8f4d1759b7ddf5409cf9
Score10/10-
BlackMatter Ransomware
BlackMatter ransomware group claims to be Darkside and REvil succesor.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation