General

  • Target

    b3e82b43750c7d0833f69abd3d31751c9e8face5063573946f61abbdda513eb8

  • Size

    231KB

  • Sample

    220129-znevcshhd8

  • MD5

    00597f4f43d23ebc704702fa8d9fa5ea

  • SHA1

    7644cbcfb691c5a477dd2ba974920b9d6f101bd3

  • SHA256

    b3e82b43750c7d0833f69abd3d31751c9e8face5063573946f61abbdda513eb8

  • SHA512

    f4aab9a5c595ef5b8f53a2088935ff14f244f9581c902df1b33b8f336aeaaeb4ee4053b15c2b01fea7ff489f838e3535d662f30977893a892cae291494b684d7

Malware Config

Extracted

Path

C:\TEVwl5dwR.README.txt

Family

blackmatter

Ransom Note
~+ * + ' BLACK | () .-.,='``'=. - o - '=/_ \ | * | '=._ | \ `=./`, ' . '=.__.=' `=' * + Matter + O * ' . >>> What happens? Your network is encrypted, and currently not operational. We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data. >>> What data stolen? From your network was stole 500 GB of data. If you do not contact us we will publish all your data in our blog and will send it to the biggest mass media. Blog post link: http://blackmax7su6mbwtcyo3xwtpfxpm356jjqrs34y4crcytpw7mifuedyd.onion/WBO0PqltgJ/46f53c1a25a576184e0429cd24bfcd36 >>> What guarantees? We are not a politically motivated group and we do not need anything other than your money. If you pay, we will provide you the programs for decryption and we will delete your data. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. We always keep our promises. >> How to contact with us? 1. Download and install TOR Browser (https://www.torproject.org/). 2. Open http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/LA60VOT96UX8HHOG >> Warning! Recovery recommendations. We strongly recommend you to do not MODIFY or REPAIR your files, that will damage them.
URLs

http://blackmax7su6mbwtcyo3xwtpfxpm356jjqrs34y4crcytpw7mifuedyd.onion/WBO0PqltgJ/46f53c1a25a576184e0429cd24bfcd36

http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/LA60VOT96UX8HHOG

Extracted

Family

blackmatter

Version

2.0

Botnet

6bc8a6d43013c7308bf41306cf526d7a

C2

mepocs

memtas

veeam

svc$

backup

sql

vss

msexchange

Attributes
  • attempt_auth

    true

  • create_mutex

    true

  • encrypt_network_shares

    true

  • exfiltrate

    true

  • mount_volumes

    true

rsa_pubkey.base64
aes.base64

Targets

    • Target

      b3e82b43750c7d0833f69abd3d31751c9e8face5063573946f61abbdda513eb8

    • Size

      231KB

    • MD5

      00597f4f43d23ebc704702fa8d9fa5ea

    • SHA1

      7644cbcfb691c5a477dd2ba974920b9d6f101bd3

    • SHA256

      b3e82b43750c7d0833f69abd3d31751c9e8face5063573946f61abbdda513eb8

    • SHA512

      f4aab9a5c595ef5b8f53a2088935ff14f244f9581c902df1b33b8f336aeaaeb4ee4053b15c2b01fea7ff489f838e3535d662f30977893a892cae291494b684d7

    • BlackMatter Ransomware

      BlackMatter ransomware group claims to be Darkside and REvil succesor.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Sets desktop wallpaper using registry

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Impact

Defacement

1
T1491

Tasks