General
-
Target
6e846881115448d5d4b69bf020fcd5872a0efef56e582f6ac8e3e80ea79b7a55
-
Size
44KB
-
Sample
240419-wzg73scf7x
-
MD5
c00dd7206db94bf3825145d5d901b3b0
-
SHA1
6befec1a22035d1842e1d826ebce739b4f3d9e39
-
SHA256
6e846881115448d5d4b69bf020fcd5872a0efef56e582f6ac8e3e80ea79b7a55
-
SHA512
27806babe49896fc12667e2cadbf74ba4d312cb985a3d8c9b61225d1c121682abf7de705b28f914b507cd9a304fd58cf272cc82c6e930774404731f9f7109088
-
SSDEEP
768:Q5162qoqoLW3xmwS+MiAjxscIU4wuZksiLHnEiULBxa+8oDdCdUAIvvQyVdyIDrW:Qmro23xm53iAV/D8ckNVdCLI3QCQIOrl
Behavioral task
behavioral1
Sample
730f2d6243055c786d737bae0665267b962c64f57132e9ab401d6e7625c3d0a4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
730f2d6243055c786d737bae0665267b962c64f57132e9ab401d6e7625c3d0a4.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
blackmatter
2.0
3e8e2ab5fbb392508535983b7446ba17
https://fluentzip.org
http://fluentzip.org
-
attempt_auth
false
-
create_mutex
true
-
encrypt_network_shares
true
-
exfiltrate
true
-
mount_volumes
true
Extracted
C:\Sl7OiPzOX.README.txt
blackmatter
http://supp24maprinktc7uizgfyqhisx7lkszb6ogh6lwdzpac23w3mh4tvyd.onion/S2A4H6RGPHHLU1IJRLNTN
Targets
-
-
Target
730f2d6243055c786d737bae0665267b962c64f57132e9ab401d6e7625c3d0a4
-
Size
80KB
-
MD5
5fe6daa399b18058f9b7e58fe31b4131
-
SHA1
1ed39024b03b3490049b4d6f2577ca36e18b405a
-
SHA256
730f2d6243055c786d737bae0665267b962c64f57132e9ab401d6e7625c3d0a4
-
SHA512
31baf91130c7e932068e12fec6dfde7ad283487b9f01b92e64835cf91aba1c4f51602066994a8200b73d219e6ea82929cde1f11ca82fb2a48af90418e57e324c
-
SSDEEP
1536:AnICS4A79p2qFTM2HT02F4mHI5myK9IXU:PpOqFQ2HT025HWK9I
Score10/10-
BlackMatter Ransomware
BlackMatter ransomware group claims to be Darkside and REvil succesor.
-
Renames multiple (175) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-