General
-
Target
45ecce9dfec886e2b092a996f6affb9e7417d6121e58b0ec643be7e36a03106d
-
Size
66KB
-
Sample
220124-ax2ytaggh3
-
MD5
f04d97ffa32eec5aac8f84d86a1f51a0
-
SHA1
bd75fd070c4962aa59653f934e4af68b609a021d
-
SHA256
45ecce9dfec886e2b092a996f6affb9e7417d6121e58b0ec643be7e36a03106d
-
SHA512
77bdb50d7b300e6acd2ef273751673e7dc6c52610ce2c007f7d98805535c10dc96975b74a7ee8ed41f3097a485e57803053c52f0b1f27e524f7f04b0aee7d284
Static task
static1
Behavioral task
behavioral1
Sample
45ecce9dfec886e2b092a996f6affb9e7417d6121e58b0ec643be7e36a03106d.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
45ecce9dfec886e2b092a996f6affb9e7417d6121e58b0ec643be7e36a03106d.exe
Resource
win10-en-20211208
Malware Config
Extracted
blackmatter
1.2
bab21ee475b52c0c9eb47d23ec9ba1d1
https://paymenthacks.com
http://paymenthacks.com
https://mojobiden.com
http://mojobiden.com
-
attempt_auth
false
-
create_mutex
true
-
encrypt_network_shares
true
-
exfiltrate
true
-
mount_volumes
true
Extracted
C:\TEVwl5dwR.README.txt
blackmatter
http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/GDBJS76DH3D4IKQD2QO7R
Targets
-
-
Target
45ecce9dfec886e2b092a996f6affb9e7417d6121e58b0ec643be7e36a03106d
-
Size
66KB
-
MD5
f04d97ffa32eec5aac8f84d86a1f51a0
-
SHA1
bd75fd070c4962aa59653f934e4af68b609a021d
-
SHA256
45ecce9dfec886e2b092a996f6affb9e7417d6121e58b0ec643be7e36a03106d
-
SHA512
77bdb50d7b300e6acd2ef273751673e7dc6c52610ce2c007f7d98805535c10dc96975b74a7ee8ed41f3097a485e57803053c52f0b1f27e524f7f04b0aee7d284
Score10/10-
BlackMatter Ransomware
BlackMatter ransomware group claims to be Darkside and REvil succesor.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-