General
-
Target
b3e82b43750c7d0833f69abd3d31751c9e8face5063573946f61abbdda513eb8
-
Size
231KB
-
Sample
220129-znevcshhd8
-
MD5
00597f4f43d23ebc704702fa8d9fa5ea
-
SHA1
7644cbcfb691c5a477dd2ba974920b9d6f101bd3
-
SHA256
b3e82b43750c7d0833f69abd3d31751c9e8face5063573946f61abbdda513eb8
-
SHA512
f4aab9a5c595ef5b8f53a2088935ff14f244f9581c902df1b33b8f336aeaaeb4ee4053b15c2b01fea7ff489f838e3535d662f30977893a892cae291494b684d7
Static task
static1
Behavioral task
behavioral1
Sample
b3e82b43750c7d0833f69abd3d31751c9e8face5063573946f61abbdda513eb8.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
b3e82b43750c7d0833f69abd3d31751c9e8face5063573946f61abbdda513eb8.exe
Resource
win10-en-20211208
Malware Config
Extracted
C:\TEVwl5dwR.README.txt
blackmatter
http://blackmax7su6mbwtcyo3xwtpfxpm356jjqrs34y4crcytpw7mifuedyd.onion/WBO0PqltgJ/46f53c1a25a576184e0429cd24bfcd36
http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/LA60VOT96UX8HHOG
Extracted
blackmatter
2.0
6bc8a6d43013c7308bf41306cf526d7a
mepocs
memtas
veeam
svc$
backup
sql
vss
msexchange
-
attempt_auth
true
-
create_mutex
true
-
encrypt_network_shares
true
-
exfiltrate
true
-
mount_volumes
true
Targets
-
-
Target
b3e82b43750c7d0833f69abd3d31751c9e8face5063573946f61abbdda513eb8
-
Size
231KB
-
MD5
00597f4f43d23ebc704702fa8d9fa5ea
-
SHA1
7644cbcfb691c5a477dd2ba974920b9d6f101bd3
-
SHA256
b3e82b43750c7d0833f69abd3d31751c9e8face5063573946f61abbdda513eb8
-
SHA512
f4aab9a5c595ef5b8f53a2088935ff14f244f9581c902df1b33b8f336aeaaeb4ee4053b15c2b01fea7ff489f838e3535d662f30977893a892cae291494b684d7
-
BlackMatter Ransomware
BlackMatter ransomware group claims to be Darkside and REvil succesor.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-