General
-
Target
730f2d6243055c786d737bae0665267b962c64f57132e9ab401d6e7625c3d0a4
-
Size
80KB
-
Sample
240308-mf9njsde8y
-
MD5
5fe6daa399b18058f9b7e58fe31b4131
-
SHA1
1ed39024b03b3490049b4d6f2577ca36e18b405a
-
SHA256
730f2d6243055c786d737bae0665267b962c64f57132e9ab401d6e7625c3d0a4
-
SHA512
31baf91130c7e932068e12fec6dfde7ad283487b9f01b92e64835cf91aba1c4f51602066994a8200b73d219e6ea82929cde1f11ca82fb2a48af90418e57e324c
-
SSDEEP
1536:AnICS4A79p2qFTM2HT02F4mHI5myK9IXU:PpOqFQ2HT025HWK9I
Behavioral task
behavioral1
Sample
730f2d6243055c786d737bae0665267b962c64f57132e9ab401d6e7625c3d0a4.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
730f2d6243055c786d737bae0665267b962c64f57132e9ab401d6e7625c3d0a4.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
blackmatter
2.0
3e8e2ab5fbb392508535983b7446ba17
https://fluentzip.org
http://fluentzip.org
-
attempt_auth
false
-
create_mutex
true
-
encrypt_network_shares
true
-
exfiltrate
true
-
mount_volumes
true
Extracted
C:\FLNjIiJjs.README.txt
blackmatter
http://supp24maprinktc7uizgfyqhisx7lkszb6ogh6lwdzpac23w3mh4tvyd.onion/S2A4H6RGPHHLU1IJRLNTN
Targets
-
-
Target
730f2d6243055c786d737bae0665267b962c64f57132e9ab401d6e7625c3d0a4
-
Size
80KB
-
MD5
5fe6daa399b18058f9b7e58fe31b4131
-
SHA1
1ed39024b03b3490049b4d6f2577ca36e18b405a
-
SHA256
730f2d6243055c786d737bae0665267b962c64f57132e9ab401d6e7625c3d0a4
-
SHA512
31baf91130c7e932068e12fec6dfde7ad283487b9f01b92e64835cf91aba1c4f51602066994a8200b73d219e6ea82929cde1f11ca82fb2a48af90418e57e324c
-
SSDEEP
1536:AnICS4A79p2qFTM2HT02F4mHI5myK9IXU:PpOqFQ2HT025HWK9I
Score10/10-
BlackMatter Ransomware
BlackMatter ransomware group claims to be Darkside and REvil succesor.
-
Renames multiple (153) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-