General
-
Target
bcef5de9b1667dcdded82596b3a2b4b11c8546659f49662bb352d754d869c641
-
Size
34KB
-
Sample
220809-x3nppsehep
-
MD5
6f5c77478795ff7fb9700ed50b334429
-
SHA1
6803d62254edf3bdd3bc523422ff98e6120b6e5b
-
SHA256
668a4a2300f36c9df0f7307cc614be3297f036fa312a424765cdb2c169187fe6
-
SHA512
40e4ffd227443003e0506f8d1fbfbacde54f9bfb5fa6908f05e134ee25217d3c3907d7c981107d642c071063b57253b4727fb6a211d7698a7a9bae2d8beede5f
Behavioral task
behavioral1
Sample
bcef5de9b1667dcdded82596b3a2b4b11c8546659f49662bb352d754d869c641.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
bcef5de9b1667dcdded82596b3a2b4b11c8546659f49662bb352d754d869c641.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
blackmatter
1.2
bab21ee475b52c0c9eb47d23ec9ba1d1
https://paymenthacks.com
http://paymenthacks.com
https://mojobiden.com
http://mojobiden.com
-
attempt_auth
false
-
create_mutex
true
-
encrypt_network_shares
true
-
exfiltrate
true
-
mount_volumes
true
Extracted
C:\iGJgzMxgY.README.txt
blackmatter
http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/GDBJS76DH3D4IKQD2QO7R
Extracted
blackmatter
1.2
Targets
-
-
Target
bcef5de9b1667dcdded82596b3a2b4b11c8546659f49662bb352d754d869c641
-
Size
34KB
-
MD5
6f5c77478795ff7fb9700ed50b334429
-
SHA1
6803d62254edf3bdd3bc523422ff98e6120b6e5b
-
SHA256
668a4a2300f36c9df0f7307cc614be3297f036fa312a424765cdb2c169187fe6
-
SHA512
40e4ffd227443003e0506f8d1fbfbacde54f9bfb5fa6908f05e134ee25217d3c3907d7c981107d642c071063b57253b4727fb6a211d7698a7a9bae2d8beede5f
Score10/10-
BlackMatter Ransomware
BlackMatter ransomware group claims to be Darkside and REvil succesor.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-