Sites
Favicon | Title | Available | Last Visit | FQDN | Screenshot |
---|---|---|---|---|---|
BlackMatter | 🔴 | 2021-11-04 21:45:29.471099 | blackmax7su6mbwtcyo3xwtpfxpm356jjqrs34y4crcytpw7mifuedyd.onion | N/A |
Ransomware-as-a-Service
Favicon | Title | Available | Last Visit | FQDN | Screenshot |
---|---|---|---|---|---|
BlackMatter | 🔴 | 2021-11-04 21:45:29.471099 | blackmax7su6mbwtcyo3xwtpfxpm356jjqrs34y4crcytpw7mifuedyd.onion | N/A |
Discovery | RMM Tools | Defense Evasion | Credential Theft | OffSec | Networking | LOLBAS | Exfiltration |
---|---|---|---|---|---|---|---|
PrivatLab |
This information is provided by Ransomware-Tool-Matrix
Name | # Msg | Initial Ransom | Negotiated Ransom | Paid |
---|---|---|---|---|
20210907 | 77 | N/A | N/A | |
20210829 | 44 | N/A | N/A |
This information is provided by Valéry Marchive & Julien Mousqueton
Employees(s) | Customer(s) | Third Party Employee(s) |
---|---|---|
This information is provided by HudsonRock
import "pe"
import "hash"
rule ransomware_win_blackmatter {
meta:
id = "9b2d8ac3-b4d1-40f5-ac57-411547dcb2cf"
version = "1.0"
description = "Detect Black matter ransomware (2021-07-23)"
author = "Sekoia.io"
creation_date = "2021-08-03"
classification = "TLP:CLEAR"
condition:
for any i in (0..pe.number_of_sections-1) : (
hash.md5(pe.sections[i].raw_data_offset, pe.sections[i].raw_data_size) == "5e89d335de2021a2c268acf00ec513e5"
)
}