General
-
Target
2f1404af9417dbbbe69d53cb0cc0d6f2fc79138c372ab3c498ec05f60dbdc9f3
-
Size
44KB
-
Sample
220129-znj43shhe2
-
MD5
13067ecf3b17d7a6543e368db7f9e5a5
-
SHA1
68bf9a4c9b52f6769dd4f8242903103bfc96e8b1
-
SHA256
2f1404af9417dbbbe69d53cb0cc0d6f2fc79138c372ab3c498ec05f60dbdc9f3
-
SHA512
a644b179419490e0ae5f4c1bb990bb318b09b08fdc8deb0e1db59e21b7a189c7f5787b4014ab463c6877fed8c50bf90945347eb4859373a52e75db1a60f027cf
Static task
static1
Behavioral task
behavioral1
Sample
2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
Resource
win10-en-20211208
Malware Config
Extracted
blackmatter
2.0
207aab0afc614ac68359fc63f9665961
https://fluentzip.org
http://fluentzip.org
-
attempt_auth
false
-
create_mutex
true
-
encrypt_network_shares
true
-
exfiltrate
true
-
mount_volumes
true
Extracted
C:\TEVwl5dwR.README.txt
blackmatter
http://supp24maprinktc7uizgfyqhisx7lkszb6ogh6lwdzpac23w3mh4tvyd.onion/EWX33VYY3IGOXSG5ZZ2
Targets
-
-
Target
2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c
-
Size
80KB
-
MD5
5c66cd4f21254f83663819138e634dd9
-
SHA1
6626cae85970e6490b8b0bf9da9aa4b57a79bb62
-
SHA256
2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c
-
SHA512
093e1fb491d73ee240f1b0084bda233ef272618b56e61ed8602a57dec7b241b3f80a4a1749ff46d141399e71dd6127c9a8893c9d8d24c6aa48b0479a7ab42a2a
Score10/10-
BlackMatter Ransomware
BlackMatter ransomware group claims to be Darkside and REvil succesor.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-