General
-
Target
930b9c1792a539acdb051af34de91060.bin
-
Size
54KB
-
Sample
230312-b5vp5scc64
-
MD5
6620f12b53aebe795b100ca639cbba37
-
SHA1
a8fcda4c6214c3c06d60771d8f7530b308e33d78
-
SHA256
d9eba524d87f742cebb5cb5788f7ab38726184321f1998dcb28488d15fa3b348
-
SHA512
a5d6a92faca7dafd49192f4362657bacd30a8c596e1bbe19e8f8e06dffeff4afc2302a65e663eaf63e1c4b444e9b235b2d9512d67dbdc9715d448b2f8a481eda
-
SSDEEP
768:05TfI5m+fJc4YkGw9ivQU3Yred017otDvgpn3I0A3SF3Xh3gwEoGBA:8TgVB64iareW1xW6gFBA
Behavioral task
behavioral1
Sample
7a223a0aa0f88e84a68da6cde7f7f5c3bb2890049b0bf3269230d87d2b027296.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
7a223a0aa0f88e84a68da6cde7f7f5c3bb2890049b0bf3269230d87d2b027296.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
blackmatter
3.0
0361b6a1f37016ed147e7617a3c08300
-
attempt_auth
false
-
create_mutex
true
-
encrypt_network_shares
true
-
exfiltrate
false
-
mount_volumes
true
Extracted
C:\Users\sfgL6ekLx.README.txt
blackmatter
http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/QLA44XK2K4K1RZL9
Targets
-
-
Target
7a223a0aa0f88e84a68da6cde7f7f5c3bb2890049b0bf3269230d87d2b027296.exe
-
Size
95KB
-
MD5
930b9c1792a539acdb051af34de91060
-
SHA1
2cda394db71fc67905e31d9e8f4b88ef85a248dc
-
SHA256
7a223a0aa0f88e84a68da6cde7f7f5c3bb2890049b0bf3269230d87d2b027296
-
SHA512
9bd26a83d30f69ab7d9dfbe9c3b81c8fd2381f331ce139140646932cf09b461f177c4eb236cd2194d190c50598ac3de0023cfe38e843b08bbe2f120e790ee3f1
-
SSDEEP
1536:SUICS4ADkFAztzRyxoWtBErqylVxn1GZnKoEcXb/50Qtef0:sBkwtdyxoUH4BYnKobfw
Score10/10-
BlackMatter Ransomware
BlackMatter ransomware group claims to be Darkside and REvil succesor.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-