General

  • Target

    26a7146fbed74a17e9f2f18145063de07cc103ce53c75c8d79bbc5560235c345

  • Size

    80KB

  • MD5

    471db2ef4582dc264ae95d2838f81588

  • SHA1

    b6e130a43134613c45f10f0160090e26ded4dd3c

  • SHA256

    26a7146fbed74a17e9f2f18145063de07cc103ce53c75c8d79bbc5560235c345

  • SHA512

    8319596227fff44191f7cb9b03d7f6b1b20d89f6e7a034773ddd6d631086c609a1caf2f4f53bd89516925427676a75496aef9dd8754a45cd38536bfb856ed7b6

  • SSDEEP

    768:6HVfahoICS4AI4kyPh2qFSpAM0zHTMoXsLipP4+1Kkxwz5m7HEzbDBnpzTN:YnICS4A79p2qFTM2HT02F4mHI5mKlp

Malware Config

Extracted

Family

blackmatter

Version

2.0

Botnet

b61fd808b57c1cab3824a887857bf6a8

Credentials
  • Username:
    administrator@parkhotel
  • Password:
    Silvana7018
C2

https://fluentzip.org

http://fluentzip.org

Attributes
  • attempt_auth

    true

  • create_mutex

    true

  • encrypt_network_shares

    true

  • exfiltrate

    true

  • mount_volumes

    true

rsa_pubkey.base64
aes.base64

Signatures

Files

  • 26a7146fbed74a17e9f2f18145063de07cc103ce53c75c8d79bbc5560235c345
    .exe windows x86

    31485670ea3fb2592f59a341251d0e8c


    Code Sign

    Headers

    Imports

    Sections