Static task
static1
Behavioral task
behavioral1
Sample
daed41395ba663bef2c52e3d1723ac46253a9008b582bb8d9da9cb0044991720.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
daed41395ba663bef2c52e3d1723ac46253a9008b582bb8d9da9cb0044991720.exe
Resource
win10-en-20210920
General
-
Target
daed41395ba663bef2c52e3d1723ac46253a9008b582bb8d9da9cb0044991720
-
Size
67KB
-
MD5
e6b0276bc3f541d8ff1ebb1b59c8bd29
-
SHA1
295de44a0adbef57c51458978ccd71437aff0bf1
-
SHA256
daed41395ba663bef2c52e3d1723ac46253a9008b582bb8d9da9cb0044991720
-
SHA512
cdc851b9a7dc396384cbd69353f4e594cb3ac80679abfaa9ebf7bf849bca1b2e2c233c9634239e4aaa4e7f02a2af096733bef1b760ae0e6d660918217cecdcee
Malware Config
Extracted
blackmatter
1.2
512478c08dada2af19e49808fbda5b0b
Protocol: smtp- Port:
587 - Username:
[email protected] - Password:
120Heisler
Protocol: smtp- Port:
587 - Username:
[email protected] - Password:
Tesla2019
Protocol: smtp- Port:
587 - Username:
[email protected] - Password:
iteam8**
https://paymenthacks.com
http://paymenthacks.com
https://mojobiden.com
http://mojobiden.com
-
attempt_auth
true
-
create_mutex
true
-
encrypt_network_shares
true
-
exfiltrate
true
-
mount_volumes
true
Signatures
-
Blackmatter family
Files
-
daed41395ba663bef2c52e3d1723ac46253a9008b582bb8d9da9cb0044991720.exe windows x86