General
-
Target
BlackMatter.7a223a0aa0f88e84a68da.bin.exe
-
Size
95KB
-
Sample
230310-1mlrysfd73
-
MD5
930b9c1792a539acdb051af34de91060
-
SHA1
2cda394db71fc67905e31d9e8f4b88ef85a248dc
-
SHA256
7a223a0aa0f88e84a68da6cde7f7f5c3bb2890049b0bf3269230d87d2b027296
-
SHA512
9bd26a83d30f69ab7d9dfbe9c3b81c8fd2381f331ce139140646932cf09b461f177c4eb236cd2194d190c50598ac3de0023cfe38e843b08bbe2f120e790ee3f1
-
SSDEEP
1536:SUICS4ADkFAztzRyxoWtBErqylVxn1GZnKoEcXb/50Qtef0:sBkwtdyxoUH4BYnKobfw
Behavioral task
behavioral1
Sample
BlackMatter.7a223a0aa0f88e84a68da.bin.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
BlackMatter.7a223a0aa0f88e84a68da.bin.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
blackmatter
3.0
0361b6a1f37016ed147e7617a3c08300
-
attempt_auth
false
-
create_mutex
true
-
encrypt_network_shares
true
-
exfiltrate
false
-
mount_volumes
true
Extracted
C:\Users\uBBIsrJIE.README.txt
blackmatter
http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/QLA44XK2K4K1RZL9
Targets
-
-
Target
BlackMatter.7a223a0aa0f88e84a68da.bin.exe
-
Size
95KB
-
MD5
930b9c1792a539acdb051af34de91060
-
SHA1
2cda394db71fc67905e31d9e8f4b88ef85a248dc
-
SHA256
7a223a0aa0f88e84a68da6cde7f7f5c3bb2890049b0bf3269230d87d2b027296
-
SHA512
9bd26a83d30f69ab7d9dfbe9c3b81c8fd2381f331ce139140646932cf09b461f177c4eb236cd2194d190c50598ac3de0023cfe38e843b08bbe2f120e790ee3f1
-
SSDEEP
1536:SUICS4ADkFAztzRyxoWtBErqylVxn1GZnKoEcXb/50Qtef0:sBkwtdyxoUH4BYnKobfw
Score10/10-
BlackMatter Ransomware
BlackMatter ransomware group claims to be Darkside and REvil succesor.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-