Trending

HomeBlog
Dissecting BlackMatter Ransomware
Cyble-BlackMatter-Ransomware-Darkweb

Dissecting BlackMatter Ransomware

BlackMatter Ransomware group has used and enhanced techniques from the existing ransomware groups such as DarkSide, REvil, and LockBit.

Recently, a new ransomware group has emerged and started posting multiple threads on cybercrime forums stating that they seek affiliates and partners. The Threat Actor (TA) behind this ransomware has used and enhanced techniques from the existing ransomware groups such as DarkSide, REvil, and LockBit. Cyble Research Lab has covered the overview and way of work of the BlackMatter ransomware group in an earlier Blog (BlackMatter Under The Lens: An Emerging Ransomware Group Looking For Affiliates).

The BlackMatter ransomware encrypts the document files and asks for ransom in exchange for the decryptor tool. Cyble Research Lab has identified that BlackMatter ransomware has used multiple anti-debugging and anti-analysis techniques. In this blog post, we are uncovering the notorious ransomware named BlackMatter.

Technical Analysis

Our static analysis found that the malware file is a GUI-based x86 architecture executable compiled on  2021-07-23 21:51:18, as shown in Figure 1.

Cyble BlackMatter Static Analaysis
Figure 1 Static Information About BlackMatter Ransomware

Cyble Research Lab has also found that the malware uses only three libraries: gdi32.dll, user32.dll, and kernel32.dll, as shown in Figure 2Furthermore, only a few APIs (Application Programming Interfaces) were present in the ransomware import table, as shown in Figure 3. 

Cyble BlackMatter Libraries
Figure 2 Libraries Used by Ransomware
Cyble BlackMatter Import Table API
Figure 3 Import Table APIs List

Upon Execution, the ransomware does not create any subprocesses. Instead, it uses multiple threads, as shown in Figure 4.

Cyble BlackMatter Process Tree
Figure 4 Process Tree of Ransomware

Figure 5 shows the ransomware encrypted user document files with appended random (example .9F4wvLwwX) extension to all encrypted files.

report-ad-banner
Cyble BlackMatter Encrypted Files
Figure 5 Encrypted File Extension Renamed

The BlackMatter ransomware group also drops a ransom note on the victim’s machine to guide the victim through the communication process to TA in getting the decryption tool, as shown in Figure 6.

Cyble BlackMatter Ransom Notes
Figure 6 Ransom Note Dropped by Ransomware

Once the encryption process ends, the ransomware changes the wallpaper to show the message to the victim, as shown in Figure 7.

Cyble BlackMatter Wallpaper Note
Figure 7 Message Shown to the Victim After Ransomware Infection Process Done

Cyble Research Lab also captured the traffic initiated by the ransomware to communicate and send data to TA Command & Control Server (C2), as shown in Figure 8.

Cyble BlackMatter C2 Traffic
Figure 8 Ransomware Communicating to C2

Dissection of BlackMatter Ransomware

Cyble Research Lab started with code and behavior analysis. As shown in Figure 9, the ransomware code is calling multiple functions.

Cyble BlackMatter Code Functions
Figure 9 Function’s Called in Ransomware

Furthermore, only five essential key functions are part of this ransomware, as shown in Figure 10.

Cyble BlackMatter Code Key Functions
Figure 10 Key Functions of the Ransomware

Figure 11 shows the function used to dynamically load all the additional libraries and APIs required by this ransomware.

Cyble BlackMatter Code Resolve Libraries Function
Figure 11 Function Used for Loading Libraries and Resolving APIs

The above function is responsible for loading various system dynamic link libraries (.dll) and the required APIs present in every library. The dword_* points to the encrypted APIs required by this ransomware, as shown in Figure 12.

Cyble BlackMatter Encrypted API
Figure 12 APIs in Encrypted Format

All other Libraries/DLL’s are then loaded after executing the subsequent function in sub_405E5C, as shown in Figure 13.

Cyble BlackMatter Libraries Loaded
Figure 13 Libraries Loaded After Execution of Function sub_405E5C

The ransomware loads around 180+ Windows APIs, as shown in Figure 14. 

Cyble BlackMatter Function Used
Figure 14 The APIs Resolved by the Function sub_405E5C

Upon execution, the ransomware creates a Mutex with the name 0d216858b68c0bcae655c2eaffeee2ad, as shown in Figure 15. The mutex’s function is used to ensure that only one instance of ransomware is running at a time.

Cyble BlackMatter
Figure 15 Ransomware Creating Mutex

Cyble Research Lab has also noticed that the ransomware is deleting three windows services. These services are mainly responsible for Shadow Copies of the windows OS (Operating System), as shown in Table 1.

ServiceDescription
vmicvssHyper-V Volume Shadow Copy Requestor
vmvssVolume Shadow Copy service    
vssVolume Shadow Copy Service
Table 1 Service’s Deleted by Ransomware

As shown in Figure 16, the ransomware uses OpenServiceW API to control vmicvss and uses DeleteService API to delete the service. It is doing the same with other services previously shown in Table 1.

Cyble BlackMatter Deleting Service
Figure 16 API Call to Open VMICVSS Service

Furthermore, the ransomware uses FindFirstVolumeW, FindNextVolumeW, and VolumeClose APIs to find the Windows Volume drive, as shown in Figure 17.

Cyble BlackMatter Find Volume
Figure 17 Finding the Volume

The malware also deletes the content of Recycle Bin, as shown in Figure 18.

Cyble BlackMatter Cleaning RecycleBin
Figure 18 Deleting Data from Recycle Bin

Figure 19 shows that the ransomware communicates to the Attacker’s C2 URL and sends the Victim’s System information in an encrypted format.

Cyble BlackMatter C2 Data
Figure 19 Ransomware sends System Information to C2

Figure 20 shows the collected system information in plaintext (JSON format) stored in memory.

Cyble BlackMatter Victim System Information
Figure 20 The JSON Data which has been sent to C2

The ransomware is likely receiving a response from C2, which is then decoded to JSON format, as shown in Figure 21.

Cyble BlackMatter C2 JSON Response
Figure 21 The Additional JSON Body Used by Ransomware

Additionally, the ransomware also uses the Restart Manager technique. This technique checks whether the targeted file is in use by another process. If so, it will end that process and encrypt the target file, as shown in Figure 22.

Cyble BlackMatter Restart Technique
Figure 22 Ransomware using Restart Manager Technique

BlackMatter ransomware group uses standard ransomware encryption techniques, as shown in Figure 23.

Cyble BlackMatter Ransomware Execution Flow
Figure 23 General Infection Process of Ransomware

BlackMatter encrypts files, communicates, and shares collected system information to its C2 server and does data exfiltration or additional functionality based on the C2 command.

Conclusion

BlackMatter has used various sophisticated techniques to make the malware analysis hard. As per our initial analysis, the affiliates who target various organizations would get initial access to the victim organization infrastructure and execute the ransomware.

Cyble Research Labs continuously monitors BlackMatter activities and keeps informing our clients with recent updates about this campaign.

Our Recommendations

We have listed some essential cybersecurity best practices that create the first line of control against attackers. We recommend that our readers follow the suggestions given below:

  • Use strong passwords and enforce multi-factor authentication wherever possible.
  • Turn on the automatic software update feature on your computer, mobile, and other connected devices wherever possible and pragmatic. 
  • Use a reputed anti-virus and Internet security software package on your connected devices, including PC, laptop, and mobile.    
  • Refrain from opening untrusted links and email attachments without verifying their authenticity.
  • Conduct regular backup practices and keep those backups offline or in a separate network.

MITRE ATT&CK® Techniques

TacticTechnique IDTechnique Name
Initial access  T1566Phishing 
Execution   T1204User Execution
Discovery  T1082System Information Discovery
Defense EvasionT1497.003Time-Based Evasion
ImpactT1490
T1489
T1486
Inhibit System Recovery
Service Stop
Data Encrypted for Impact

Indicators of Compromise (IoCs):  

IndicatorsIndicator typeDescription
daed41395ba663bef2c52e3d1723ac46253a9008b582bb8d9da9cb0044991720HashSHA-256
c6e2ef30a86baa670590bd21acf5b91822117e0cbe6060060bc5fe0182dace99HashSHA-256
7f6dd0ca03f04b64024e86a72a6d7cfab6abccc2173b85896fc4b431990a5984HashSHA-256
22d7d67c3af10b1a37f277ebabe2d1eb4fd25afbd6437d4377400e148bcc08d6HashSHA-256
mojobiden[.]comURLTA C2
paymenthacks[.]comURLTA C2
http:[//]supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid[.]onionTOR URLTA Contact URL

About Us

Cyble is a global threat intelligence SaaS provider that helps enterprises protect themselves from cybercrimes and exposure in the Darkweb. Its prime focus is to provide organizations with real-time visibility to their digital risk footprint. Backed by Y Combinator as part of the 2021 winter cohort, Cyble has also been recognized by Forbes as one of the top 20 Best Cybersecurity Start-ups To Watch In 2020. Headquartered in Alpharetta, Georgia, and with offices in Australia, Singapore, and India, Cyble has a global presence. To learn more about Cyble, visit https://cyble.com.

Disclaimer: This blog is based on our research and the information available at the time of writing. It is for informational purposes only and does not constitute legal, financial, or professional advice. While we strive for accuracy, we do not guarantee the completeness or reliability of the content. If any sensitive information has been inadvertently included, please contact us for correction. Cyble is not responsible for any errors, omissions, or decisions made based on this content. Readers should verify findings and seek expert advice where necessary. All trademarks, logos, and third-party content belong to their respective owners and do not imply endorsement or affiliation. All content is presented “as is” without any guarantee that it is free of confidential, proprietary, or otherwise sensitive information. If you believe any portion of this content contains inadvertently shared or sensitive data, please contact us immediately so that we may address and rectify the issue. No Liability for Errors or Omissions Due to the dynamic nature of cyber threat activity, this [blog/report/article] may include partial, outdated, or otherwise incorrect information due to unverified sources, evolving security threats, or human error. We expressly disclaim any liability for errors or omissions or any potential consequences arising from the use, misuse, or reliance on this information.

Get Threat Assessment Report

Identify External Threats Targeting Your Business​
Free

Threat Landscape Reports 2025

Upcoming Webinars

CISO's Guide to Threat Intelligence 2024

CISO’s Guide to Threat Intelligence 2024: Best Practices

Stay Ahead of Cyber Threats with Expert Insights and Strategies. Download Free E-Book Now

Share the Post:
Scroll to Top

Discover more from Cyble

Subscribe now to keep reading and get access to the full archive.

Continue reading