General
-
Target
b824bbc645f15e213b4cb2628f7d383e9e37282059b03f6fe60f7c84ea1fed1f
-
Size
72KB
-
Sample
211005-pr319aaagr
-
MD5
1dd464cbb3fbd6881eef3f05b8b1fbd5
-
SHA1
cafd8d20f2abaebbbfc367b4b4512107362f3758
-
SHA256
b824bbc645f15e213b4cb2628f7d383e9e37282059b03f6fe60f7c84ea1fed1f
-
SHA512
1564fffe28c2b7c2b18c35d68e3e254106620b2c3b7b5f41b95cfbb3a2cf0d9c42616d670b4060d09129ff18f0148c03e00bbd205f9d10697b265109a43d053c
Static task
static1
Behavioral task
behavioral1
Sample
b824bbc645f15e213b4cb2628f7d383e9e37282059b03f6fe60f7c84ea1fed1f.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
b824bbc645f15e213b4cb2628f7d383e9e37282059b03f6fe60f7c84ea1fed1f.exe
Resource
win10-en-20210920
Malware Config
Extracted
blackmatter
1.6
0c6ca0532355a106258791f50b66c153
-
attempt_auth
false
-
create_mutex
false
-
encrypt_network_shares
true
-
exfiltrate
false
-
mount_volumes
true
Extracted
C:\AVx2lZV2X.README.txt
blackmatter
http://supp24maprinktc7uizgfyqhisx7lkszb6ogh6lwdzpac23w3mh4tvyd.onion/RSW33BDOYPLWM78U9A09BZDI
Targets
-
-
Target
b824bbc645f15e213b4cb2628f7d383e9e37282059b03f6fe60f7c84ea1fed1f
-
Size
72KB
-
MD5
1dd464cbb3fbd6881eef3f05b8b1fbd5
-
SHA1
cafd8d20f2abaebbbfc367b4b4512107362f3758
-
SHA256
b824bbc645f15e213b4cb2628f7d383e9e37282059b03f6fe60f7c84ea1fed1f
-
SHA512
1564fffe28c2b7c2b18c35d68e3e254106620b2c3b7b5f41b95cfbb3a2cf0d9c42616d670b4060d09129ff18f0148c03e00bbd205f9d10697b265109a43d053c
Score10/10-
BlackMatter Ransomware
BlackMatter ransomware group claims to be Darkside and REvil succesor.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-