SYMBOLCOMMON_NAMEaka. SYNONYMS
elf.blackcat (Back to overview)

BlackCat

aka: ALPHV, Noberus
VTCollection    

ALPHV, also known as BlackCat or Noberus, is a ransomware family that is deployed as part of Ransomware as a Service (RaaS) operations. ALPHV is written in the Rust programming language and supports execution on Windows, Linux-based operating systems (Debian, Ubuntu, ReadyNAS, Synology), and VMWare ESXi. ALPHV is marketed as ALPHV on cybercrime forums, but is commonly called BlackCat by security researchers due to an icon of a black cat appearing on its leak site. ALPHV has been observed being deployed in ransomware attacks since November 18, 2021.

ALPHV can be configured to encrypt files using either the AES or ChaCha20 algorithms. In order to maximize the amount of ransomed data, ALPHV can delete volume shadow copies, stop processes and services, and stop virtual machines on ESXi servers. ALPHV can self-propagate by using PsExec to remote execute itself on other hosts on the local network.

References
2024-07-02SekoiaQuentin Bourgue
Exposing FakeBat loader: distribution methods and adversary infrastructure
BlackCat Royal Ransom EugenLoader Carbanak Cobalt Strike DICELOADER Gozi IcedID Lumma Stealer NetSupportManager RAT Pikabot RedLine Stealer SectopRAT Sliver SmokeLoader Vidar
2023-12-03Twitter (@vxunderground)VX-Underground
Tweet about ALPHV group compromising Tipalti to pressure its clients.
BlackCat BlackCat
2023-11-16CISACISA
Scattered Spider
BlackCat Ave Maria Raccoon Vidar
2023-07-13MSSP Labcocomelonc
Malware analysis report: BlackCat ransomware
BlackCat BlackCat
2023-05-30IBM SecurityIBM Security X-Force Team
BlackCat (ALPHV) ransomware levels up for stealth, speed and exfiltration
BlackCat BlackCat
2023-05-15CrowdStrikeCrowdStrike
Hypervisor Jackpotting, Part 3: Lack of Antivirus Support Opens the Door to Adversary Attacks
BlackCat SystemBC
2023-03-30United States District Court (Eastern District of New York)Fortra, HEALTH-ISAC, Microsoft
Cracked Cobalt Strike (1:23-cv-02447)
Black Basta BlackCat LockBit RagnarLocker LockBit Black Basta BlackCat Cobalt Strike Cuba Emotet LockBit Mount Locker PLAY QakBot RagnarLocker Royal Ransom Zloader
2023-03-21Github (rivitna)Andrey Zhdanov
BlackCat v3 Decryptor Scripts
BlackCat BlackCat
2022-09-28vmwareGiovanni Vigna
ESXi-Targeting Ransomware: The Threats That Are After Your Virtual Machines (Part 1)
Avoslocker Babuk Black Basta BlackCat BlackMatter Conti DarkSide HelloKitty Hive LockBit Luna RansomEXX RedAlert Ransomware REvil
2022-09-22ComputerWeeklyAlex Scroxton
ALPHV/BlackCat ransomware family becoming more dangerous
BlackCat BlackCat FIN7
2022-08-22MicrosoftMicrosoft
Extortion Economics - Ransomware’s new business model
BlackCat Conti Hive REvil AgendaCrypt Black Basta BlackCat Brute Ratel C4 Cobalt Strike Conti Hive Mount Locker Nokoyawa Ransomware REvil Ryuk
2022-08-11SecurityScorecardRobert Ames
The Increase in Ransomware Attacks on Local Governments
BlackCat BlackCat Cobalt Strike LockBit
2022-07-14SophosAndrew Brandt, Andy French, Bill Kearney, Elida Leite, Harinder Bhathal, Lee Kirkpatrick, Peter Mackenzie, Robert Weiland, Sergio Bestulic
BlackCat ransomware attacks not merely a byproduct of bad luck
BlackCat BlackCat
2022-06-29Group-IBAndrey Zhdanov, Oleg Skulkin
Fat Cats - An analysis of the BlackCat ransomware affiliate program
BlackCat BlackCat
2022-06-07AdvIntelMarley Smith, Vitali Kremez, Yelisey Boguslavskiy
BlackCat — In a Shifting Threat Landscape, It Helps to Land on Your Feet: Tech Dive
BlackCat BlackCat Cobalt Strike
2022-06-01Jorge TestaJorge Testa
Killing The Bear - Alphv
BlackCat BlackCat
2022-05-11KasperskyGReAT
New ransomware trends in 2022
BlackCat Conti DEADBOLT DoubleZero LockBit PartyTicket StealBit
2022-05-09MicrosoftMicrosoft 365 Defender Threat Intelligence Team, Microsoft Threat Intelligence Center (MSTIC)
Ransomware-as-a-service: Understanding the cybercrime gig economy and how to protect yourself
AnchorDNS BlackCat BlackMatter Conti DarkSide HelloKitty Hive LockBit REvil FAKEUPDATES Griffon ATOMSILO BazarBackdoor BlackCat BlackMatter Blister Cobalt Strike Conti DarkSide Emotet FiveHands Gozi HelloKitty Hive IcedID ISFB JSSLoader LockBit LockFile Maze NightSky Pandora Phobos Phoenix Locker PhotoLoader QakBot REvil Rook Ryuk SystemBC TrickBot WastedLocker BRONZE STARLIGHT
2022-04-21ForescoutVedere Labs
Analysis of an ALPHV incident
BlackCat
2022-04-08The Hacker NewsRavie Lakshmanan
Researchers Connect BlackCat Ransomware with Past BlackMatter Malware Activity
BlackCat BlackMatter BlackCat BlackMatter
2022-04-07KasperskyGReAT
A Bad Luck BlackCat
BlackCat BlackCat
2022-03-27Bleeping ComputerLawrence Abrams
Hive ransomware ports its Linux VMware ESXi encryptor to Rust
BlackCat Hive Hive
2022-03-22The RegisterJeff Burt
This is a BlackCat you don't want crossing your path
BlackCat BlackMatter
2022-03-17CiscoCaitlin Huey, Tiago Pereira
From BlackMatter to BlackCat: Analyzing two attacks from one affiliate
BlackCat BlackMatter BlackCat BlackMatter
2022-02-23EmsisoftSenan Conrad
Ransomware Profile: ALPHV
BlackCat
2022-02-08TrellixArnab Roy
BlackCat Ransomware as a Service - The Cat is certainly out of the bag!
BlackCat BlackCat
2022-02-02ZDNetJonathan Greig
BlackCat ransomware implicated in attack on German oil companies
BlackCat BlackCat
2022-01-28KrebsOnSecurityBrian Krebs
Who Wrote the ALPHV/BlackCat Ransomware Strain?
BlackCat BlackCat
2022-01-26IntrinsecIntrinsec
ALPHV ransomware gang analysis
BlackCat BlackCat
2021-12-21Twitter (@sisoma2)sisoma2
BlackCat Ransomware Linux variant
BlackCat
Yara Rules
[TLP:WHITE] elf_blackcat_auto (20241030 | Detects elf.blackcat.)
rule elf_blackcat_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2024-10-31"
        version = "1"
        description = "Detects elf.blackcat."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/elf.blackcat"
        malpedia_rule_date = "20241030"
        malpedia_hash = "26e26953c49c8efafbf72a38076855d578e0a2e4"
        malpedia_version = "20241030"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 81fa???????? 720d b805000000 81faffffff0f }
            // n = 4, score = 200
            //   81fa????????         |                     
            //   720d                 | mov                 dword ptr [esp + 0x24], ebx
            //   b805000000           | pshufd              xmm1, xmm0, 0x44
            //   81faffffff0f         | pshufd              xmm2, xmm0, 0xee

        $sequence_1 = { 7227 b903000000 81fa???????? 721a }
            // n = 4, score = 200
            //   7227                 | mov                 dword ptr [eax], esi
            //   b903000000           | mov                 word ptr [eax + 0x5c], 2
            //   81fa????????         |                     
            //   721a                 | mov                 word ptr [eax + 0x5c], 2

        $sequence_2 = { 81f9???????? 0f823fffffff b802000000 81f9???????? 0f822effffff }
            // n = 5, score = 200
            //   81f9????????         |                     
            //   0f823fffffff         | jne                 0xfffffffd
            //   b802000000           | cmp                 dword ptr [edi + 8], 3
            //   81f9????????         |                     
            //   0f822effffff         | mov                 dword ptr [esp + 0x18], ecx

        $sequence_3 = { 0f823fffffff b802000000 81f9???????? 0f822effffff }
            // n = 4, score = 200
            //   0f823fffffff         | mov                 dword ptr [esp + 0xa0], edx
            //   b802000000           | mov                 edx, dword ptr [ebx + 0x24]
            //   81f9????????         |                     
            //   0f822effffff         | mov                 esi, dword ptr [eax]

        $sequence_4 = { 721a b804000000 81fa???????? 720d b805000000 81faffffff0f }
            // n = 6, score = 200
            //   721a                 | dec                 eax
            //   b804000000           | mov                 edi, dword ptr [ebp + 0x10]
            //   81fa????????         |                     
            //   720d                 | dec                 eax
            //   b805000000           | mov                 eax, dword ptr [ebp + 0x38]
            //   81faffffff0f         | jb                  0x486

        $sequence_5 = { b802000000 81f9???????? 7227 b803000000 81f9???????? 721a }
            // n = 6, score = 200
            //   b802000000           | mov                 dword ptr [esp + 0x34c], edx
            //   81f9????????         |                     
            //   7227                 | lea                 esi, [esp + 0x340]
            //   b803000000           | mov                 eax, dword ptr [esp + 0x2c]
            //   81f9????????         |                     
            //   721a                 | mov                 eax, 1

        $sequence_6 = { 6685db 7404 660fbccb 0fb7c9 }
            // n = 4, score = 200
            //   6685db               | nop                 word ptr cs:[eax + eax]
            //   7404                 | nop                 
            //   660fbccb             | dec                 eax
            //   0fb7c9               | cmp                 edi, ebx

        $sequence_7 = { 81fa???????? 721a b904000000 81fa???????? }
            // n = 4, score = 200
            //   81fa????????         |                     
            //   721a                 | mov                 dword ptr [esp + 0x18], esi
            //   b904000000           | mov                 eax, ecx
            //   81fa????????         |                     

        $sequence_8 = { 81f9???????? 0f823fffffff b802000000 81f9???????? }
            // n = 4, score = 200
            //   81f9????????         |                     
            //   0f823fffffff         | jne                 0x2b6
            //   b802000000           | mov                 eax, dword ptr [ebx + eax*4 - 0x4ee4c]
            //   81f9????????         |                     

        $sequence_9 = { 0fb6c8 8d1489 8d0cd1 c1e90c 6bd164 28d0 }
            // n = 6, score = 200
            //   0fb6c8               | mov                 eax, dword ptr [esp + 0x160]
            //   8d1489               | inc                 ecx
            //   8d0cd1               | mov                 dword ptr [esp + 0x24], eax
            //   c1e90c               | mov                 byte ptr [esp + 0x71], 1
            //   6bd164               | movzx               eax, word ptr [esp + 0x17c]
            //   28d0                 | movzx               eax, byte ptr [esp + 0x165]

    condition:
        7 of them and filesize < 8011776
}
Download all Yara Rules