General

  • Target

    be5bc29f58b868f4ff8cd66b4526535593e515a697bb8951c625bdfed13cccb7

  • Size

    95KB

  • Sample

    220124-awqjdsggf9

  • MD5

    75298c9dbf9784fee95782f5db5c3231

  • SHA1

    ea09bf1a3b51f66b41f529615ad78eb4db0c7e8f

  • SHA256

    be5bc29f58b868f4ff8cd66b4526535593e515a697bb8951c625bdfed13cccb7

  • SHA512

    2e54261caaa9ed73b74190e459c6eddec2ba120cb45da4d74c56a0f876565cfe2c232e788a6f6502c27db146380658c695515e2ee7cd67d9aa7be240f0d9a927

Malware Config

Extracted

Family

blackmatter

Version

3.0

Botnet

8894df2a085a1eb900cd9896235efc62

C2

䟍늶傖娩ⱼڍ쫏䤿䪔頙쭪챏嚘묁痰긯ῡ⧹ꮿ뻝觼ߦ拾ࣗ颅䧜䕤孧뮂㢸꿾抛�ᗅ툲륚㌴鹼韮鹕㥿쪧�嵶販殑핥飈඘夦悠옓惂籤∛彜澗ꨇ糤鮝恷䷮皅቉◖訊揔谝〬銠鑃ɠ楱횽熅탩ꝙ䘡秄䘗쒅翪둅鷛箵癣⛛䄗ꮲ蝷꓿ࡲ섛晱ر⼾뚳暮䀲폂簵幬稘䴻坈࢑戛繆

Attributes
  • attempt_auth

    true

  • create_mutex

    true

  • encrypt_network_shares

    true

  • exfiltrate

    true

  • mount_volumes

    true

rsa_pubkey.base64
aes.base64

Extracted

Path

C:\TEVwl5dwR.README.txt

Family

blackmatter

Ransom Note
~+ * + ' BLACK | () .-.,='``'=. - o - '=/_ \ | * | '=._ | \ `=./`, ' . '=.__.=' `=' * + Matter + O * ' . >>> What happens? Your network is encrypted, and currently not operational. We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data. >>> What data stolen? From your network was stolen 100++ GB of data. >>> What guarantees? We are not a politically motivated group and we do not need anything other than your money. If you pay, we will provide you the programs for decryption and we will delete your data. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. We always keep our promises. >> How to contact with us? 1. Download and install TOR Browser (https://www.torproject.org/). 2. Open http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/OEJ8DVY73TL6236QWOHHJFWX >> Warning! Recovery recommendations. We strongly recommend you to do not MODIFY or REPAIR your files, that will damage them.
URLs

http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/OEJ8DVY73TL6236QWOHHJFWX

Targets

    • Target

      be5bc29f58b868f4ff8cd66b4526535593e515a697bb8951c625bdfed13cccb7

    • Size

      95KB

    • MD5

      75298c9dbf9784fee95782f5db5c3231

    • SHA1

      ea09bf1a3b51f66b41f529615ad78eb4db0c7e8f

    • SHA256

      be5bc29f58b868f4ff8cd66b4526535593e515a697bb8951c625bdfed13cccb7

    • SHA512

      2e54261caaa9ed73b74190e459c6eddec2ba120cb45da4d74c56a0f876565cfe2c232e788a6f6502c27db146380658c695515e2ee7cd67d9aa7be240f0d9a927

    Score
    10/10
    • BlackMatter Ransomware

      BlackMatter ransomware group claims to be Darkside and REvil succesor.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Sets desktop wallpaper using registry

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Impact

Defacement

1
T1491

Tasks