General
-
Target
be5bc29f58b868f4ff8cd66b4526535593e515a697bb8951c625bdfed13cccb7
-
Size
95KB
-
Sample
220124-awqjdsggf9
-
MD5
75298c9dbf9784fee95782f5db5c3231
-
SHA1
ea09bf1a3b51f66b41f529615ad78eb4db0c7e8f
-
SHA256
be5bc29f58b868f4ff8cd66b4526535593e515a697bb8951c625bdfed13cccb7
-
SHA512
2e54261caaa9ed73b74190e459c6eddec2ba120cb45da4d74c56a0f876565cfe2c232e788a6f6502c27db146380658c695515e2ee7cd67d9aa7be240f0d9a927
Static task
static1
Behavioral task
behavioral1
Sample
be5bc29f58b868f4ff8cd66b4526535593e515a697bb8951c625bdfed13cccb7.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
be5bc29f58b868f4ff8cd66b4526535593e515a697bb8951c625bdfed13cccb7.exe
Resource
win10-en-20211208
Malware Config
Extracted
blackmatter
3.0
8894df2a085a1eb900cd9896235efc62
䟍늶傖娩ⱼڍ쫏䤿䪔頙쭪챏嚘묁痰긯ῡ⧹ꮿ뻝觼ߦ拾ࣗ颅䧜䕤孧뮂㢸꿾抛�ᗅ툲륚㌴鹼韮鹕㥿쪧�嵶販殑핥飈夦悠옓惂籤∛彜澗ꨇ糤鮝恷䷮皅◖訊揔谝〬銠鑃ɠ楱횽熅탩ꝙ䘡秄䘗쒅翪둅鷛箵癣⛛䄗ꮲ蝷꓿ࡲ섛晱ر⼾뚳暮䀲폂簵幬稘䴻坈戛繆
-
attempt_auth
true
-
create_mutex
true
-
encrypt_network_shares
true
-
exfiltrate
true
-
mount_volumes
true
Extracted
C:\TEVwl5dwR.README.txt
blackmatter
http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/OEJ8DVY73TL6236QWOHHJFWX
Targets
-
-
Target
be5bc29f58b868f4ff8cd66b4526535593e515a697bb8951c625bdfed13cccb7
-
Size
95KB
-
MD5
75298c9dbf9784fee95782f5db5c3231
-
SHA1
ea09bf1a3b51f66b41f529615ad78eb4db0c7e8f
-
SHA256
be5bc29f58b868f4ff8cd66b4526535593e515a697bb8951c625bdfed13cccb7
-
SHA512
2e54261caaa9ed73b74190e459c6eddec2ba120cb45da4d74c56a0f876565cfe2c232e788a6f6502c27db146380658c695515e2ee7cd67d9aa7be240f0d9a927
Score10/10-
BlackMatter Ransomware
BlackMatter ransomware group claims to be Darkside and REvil succesor.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-