MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cd6d48db36adc645d60d4e68e6e154f08e4645eaef277c373ee116ae3bf29813. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BlackMatter


Vendor detections: 14


Intelligence 14 IOCs YARA 3 File information Comments

SHA256 hash: cd6d48db36adc645d60d4e68e6e154f08e4645eaef277c373ee116ae3bf29813
SHA3-384 hash: 8257d671c06a32987f0b81232c7582f5aaa652d0b9ab0cb5c76ab7271caaa0fcdc7845a831b6a7707f61b5038303f848
SHA1 hash: f687c981426ef55212b94cfa04ba7c2c4cb2bded
MD5 hash: 3f9efe3e795af76334afbccae077a0db
humanhash: comet-hot-two-charlie
File name:ranresrefl.dll
Download: download sample
Signature BlackMatter
File size:104'448 bytes
First seen:2025-12-19 11:59:37 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 07530c85f3bf8d18d55bc566a43ea905 (1 x BlackMatter)
ssdeep 1536:3zICS4A30TY1kUS/U2ztdS1I6DdL9Ta1yDjsAap7jkfpmgJUi6:IJ0TYyUS/U2RgGWL9+KoANfz
TLSH T1A4A39D11F614D533C1E718FE7756711AB34F8D280A79A853DAE80F442869B6BFF21A83
TrID 25.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
19.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
17.1% (.EXE) Win32 Executable (generic) (4504/4/1)
7.8% (.EXE) Win16/32 Executable Delphi generic (2072/23)
7.8% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter NDA0E
Tags:BlackMatter dll lockbit

Intelligence


File Origin
# of uploads :
1
# of downloads :
166
Origin country :
CH CH
Vendor Threat Intelligence
Malware configuration found for:
LockBit
Details
LockBit
a PCG-lockbit seed, a RSA public key modulus, flags, hashes for excluded folders, files, and extensions, hashes for computer names, killed processes and services, a list of credentials, a ransom note, and information parsed from the ransom note
Verdict:
Malicious
Score:
92.5%
Tags:
malware
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
blackmatter crypt filecoder fingerprint lockbit packed ransomware virus
Verdict:
Malicious
File Type:
dll x32
First seen:
2025-12-19T09:06:00Z UTC
Last seen:
2025-12-20T02:26:00Z UTC
Hits:
~10
Detections:
Trojan-Ransom.Win32.Agent.sb HEUR:Trojan-Ransom.Win32.Lockbit.pef HEUR:Trojan-Ransom.Win32.Lockbit.gen HEUR:Trojan-Ransom.Win32.Generic Trojan-Ransom.Win32.BlackMatter.d PDM:Trojan.Win32.Generic Trojan-Ransom.Win32.Lockbit.tre Trojan-Ransom.Win32.Encoder.sb
Malware family:
BlackMatter Ransomware
Verdict:
Malicious
Verdict:
inconclusive
YARA:
5 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout Win 32 Exe x86
Threat name:
Win32.Ransomware.Lockbit
Status:
Malicious
First seen:
2025-12-19 11:40:23 UTC
File Type:
PE (Dll)
AV detection:
23 of 24 (95.83%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
lockbit
Similar samples:
Result
Malware family:
n/a
Score:
  10/10
Tags:
credential_access defense_evasion discovery ransomware spyware stealer
Behaviour
Enumerates system info in registry
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: RenamesItself
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Browser Information Discovery
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Enumerates connected drives
Indicator Removal: File Deletion
Checks computer location settings
Credentials from Password Stores: Windows Credential Manager
Deletes itself
Executes dropped EXE
Reads user/profile data of web browsers
Unpacked files
SH256 hash:
cd6d48db36adc645d60d4e68e6e154f08e4645eaef277c373ee116ae3bf29813
MD5 hash:
3f9efe3e795af76334afbccae077a0db
SHA1 hash:
f687c981426ef55212b94cfa04ba7c2c4cb2bded
SH256 hash:
22bb9791ed2ba3769b2cfc2c1961af8012cfbe41f872823cab75441247ec1b46
MD5 hash:
f6bf76bb6e8ff1bdcba4ce81385e53af
SHA1 hash:
67fb9bbf6dd5cdae1ecd1b42befcaa351c6ca832
SH256 hash:
917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2
MD5 hash:
294e9f64cb1642dd89229fff0592856b
SHA1 hash:
97b148c27f3da29ba7b18d6aee8a0db9102f47c9
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CRIME_WIN32_RANSOM_BLACKMATTER
Author:Rony (@r0ny_123)
Description:Detects Blackmatter ransomware
Rule name:Darkside
Author:@bartblaze
Description:Identifies Darkside ransomware.
Rule name:Windows_Ransomware_Lockbit_369e1e94
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

BlackMatter

DLL dll cd6d48db36adc645d60d4e68e6e154f08e4645eaef277c373ee116ae3bf29813

(this sample)

  
Delivery method
Distributed via web download

Comments