Overview
overview
10Static
static
10ransom.zip
windows7-x64
ransom.zip
windows10-2004-x64
ransom.zip
android-13-x64
ransom.zip
android-13-x64
ransom.zip
macos-10.15-amd64
ransom.zip
ubuntu-18.04-amd64
ransom.zip
debian-9-armhf
ransom.zip
debian-9-mips
ransom.zip
debian-9-mipsel
ransom/Bui...ID.txt
windows7-x64
ransom/Bui...ID.txt
windows10-2004-x64
ransom/Bui...ID.txt
android-9-x86
ransom/Bui...ID.txt
android-13-x64
ransom/Bui...ID.txt
macos-10.15-amd64
ransom/Bui...ID.txt
ubuntu-18.04-amd64
ransom/Bui...ID.txt
debian-9-armhf
ransom/Bui...ID.txt
debian-9-mips
ransom/Bui...ID.txt
debian-9-mipsel
ransom/Build/LB3.exe
windows7-x64
9ransom/Build/LB3.exe
windows10-2004-x64
9ransom/Build/LB3.exe
android-13-x64
ransom/Build/LB3.exe
android-13-x64
ransom/Build/LB3.exe
macos-10.15-amd64
ransom/Build/LB3.exe
ubuntu-18.04-amd64
ransom/Build/LB3.exe
debian-9-armhf
ransom/Build/LB3.exe
debian-9-mips
ransom/Build/LB3.exe
debian-9-mipsel
ransom/keygen.exe
windows7-x64
1ransom/keygen.exe
windows10-2004-x64
3ransom/keygen.exe
android-11-x64
ransom/keygen.exe
android-13-x64
ransom/keygen.exe
macos-10.15-amd64
General
-
Target
ransom.zip
-
Size
831KB
-
Sample
250205-m7gf3svpcl
-
MD5
7cd61bf217379a23bf42b1f9d08affab
-
SHA1
ac4cca1c691780cb6f33b476495b2fa30e00214b
-
SHA256
2882cbed0fb11c95d01b487a85338f4ec25fd44fc3f0936d68af4832d1be9a54
-
SHA512
e408d2f8bcad00448cacbc38bc747a83c4b23f484e789d129f110a51ffae417e644ae1b48350942630cbb12b3616480f73875afd55668b1b380af4606e40e44f
-
SSDEEP
24576:RyS4x8Uhh9cBLMfwp0zhbWA/7rYQXYJpD7r1OGKoW4XH:Y5xTHhhhnZYPhPH
Behavioral task
behavioral1
Sample
ransom.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ransom.zip
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
ransom.zip
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral4
Sample
ransom.zip
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral5
Sample
ransom.zip
Resource
macos-20241101-en
Behavioral task
behavioral6
Sample
ransom.zip
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral7
Sample
ransom.zip
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral8
Sample
ransom.zip
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral9
Sample
ransom.zip
Resource
debian9-mipsel-20240418-en
Behavioral task
behavioral10
Sample
ransom/Build/DECRYPTION_ID.txt
Resource
win7-20241023-en
Behavioral task
behavioral11
Sample
ransom/Build/DECRYPTION_ID.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral12
Sample
ransom/Build/DECRYPTION_ID.txt
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral13
Sample
ransom/Build/DECRYPTION_ID.txt
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral14
Sample
ransom/Build/DECRYPTION_ID.txt
Resource
macos-20241106-en
Behavioral task
behavioral15
Sample
ransom/Build/DECRYPTION_ID.txt
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral16
Sample
ransom/Build/DECRYPTION_ID.txt
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral17
Sample
ransom/Build/DECRYPTION_ID.txt
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral18
Sample
ransom/Build/DECRYPTION_ID.txt
Resource
debian9-mipsel-20240418-en
Behavioral task
behavioral19
Sample
ransom/Build/LB3.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
ransom/Build/LB3.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral21
Sample
ransom/Build/LB3.exe
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral22
Sample
ransom/Build/LB3.exe
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral23
Sample
ransom/Build/LB3.exe
Resource
macos-20241101-en
Behavioral task
behavioral24
Sample
ransom/Build/LB3.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral25
Sample
ransom/Build/LB3.exe
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral26
Sample
ransom/Build/LB3.exe
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral27
Sample
ransom/Build/LB3.exe
Resource
debian9-mipsel-20240418-en
Behavioral task
behavioral28
Sample
ransom/keygen.exe
Resource
win7-20240903-en
Behavioral task
behavioral29
Sample
ransom/keygen.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral30
Sample
ransom/keygen.exe
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral31
Sample
ransom/keygen.exe
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral32
Sample
ransom/keygen.exe
Resource
macos-20241106-en
Malware Config
Extracted
blackmatter
25.239
Targets
-
-
Target
ransom.zip
-
Size
831KB
-
MD5
7cd61bf217379a23bf42b1f9d08affab
-
SHA1
ac4cca1c691780cb6f33b476495b2fa30e00214b
-
SHA256
2882cbed0fb11c95d01b487a85338f4ec25fd44fc3f0936d68af4832d1be9a54
-
SHA512
e408d2f8bcad00448cacbc38bc747a83c4b23f484e789d129f110a51ffae417e644ae1b48350942630cbb12b3616480f73875afd55668b1b380af4606e40e44f
-
SSDEEP
24576:RyS4x8Uhh9cBLMfwp0zhbWA/7rYQXYJpD7r1OGKoW4XH:Y5xTHhhhnZYPhPH
Score3/10 -
-
-
Target
ransom/Build/DECRYPTION_ID.txt
-
Size
16B
-
MD5
abf6627efc21c211433afb3cead31d9e
-
SHA1
a6612acd7ba9f678f0cd30a3a38de3756d61d173
-
SHA256
9e20febb10124d938c514475adbe4872df835b95cd2a988b9c068eb43a8c65d7
-
SHA512
ea5cfa28be631822bf2a52d62a4cf7b426e0317ef039462d657e5bba7ab75ebde15089e2fb7bd99568a109f8b365b6065d8929c413639a0e9b491b224850febb
Score1/10 -
-
-
Target
ransom/Build/LB3.exe
-
Size
145KB
-
MD5
b2cb742a43762106fc03fa1e26fd4f68
-
SHA1
aef4e9199b06b835b6e677c0910d3ed6fdf96ef3
-
SHA256
f4dcf20fcdd95d241eadcd88ce30998189d0682132456e9254321a8d6d281611
-
SHA512
d0521e8a496e53a309acf7f9d388e684bfa068cc77d23ae6a7da75e6dea962b2a9e3dd5a27dc5e45c054aa025e3ff1a3c237a996aab2fbcfaa68483481ca4975
-
SSDEEP
3072:5qJogYkcSNm9V7D58PleQQuloQwssCnT:5q2kc4m9tDcQvuiQfD
-
Renames multiple (356) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
ransom/keygen.exe
-
Size
31KB
-
MD5
71c3b2f765b04d0b7ea0328f6ce0c4e2
-
SHA1
bf8ecb6519f16a4838ceb0a49097bcc3ef30f3c4
-
SHA256
ea6d4dedd8c85e4a6bb60408a0dc1d56def1f4ad4f069c730dc5431b1c23da37
-
SHA512
1923db134d7cee25389a07e4d48894dde7ee8f70d008cd890dd34a03b2741a54ec1555e6821755e5af8eae377ef5005e3f9afceb4681059bc1880276e9bcf035
-
SSDEEP
768:A6+T41GjHbdWCWDwDD01riWpJxKpAQJs/3JGIDLQ5:b+U+hHIBpJxixgQ
Score3/10 -
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1