SYMBOLCOMMON_NAMEaka. SYNONYMS
win.blacksuit (Back to overview)

BlackSuit


According to Trend Micro, this ransomware has significant code overlap with Royal Ransomware.

References
2023-05-31Trend MicroTrend Micro, Katherine Casona, Ivan Nicole Chavez, Ieriz Nicolle Gonzalez, Jeffrey Francis Bonaobra
@online{micro:20230531:investigating:77b7e51, author = {Trend Micro and Katherine Casona and Ivan Nicole Chavez and Ieriz Nicolle Gonzalez and Jeffrey Francis Bonaobra}, title = {{Investigating BlackSuit Ransomware’s Similarities to Royal}}, date = {2023-05-31}, organization = {Trend Micro}, url = {https://www.trendmicro.com/en_us/research/23/e/investigating-blacksuit-ransomwares-similarities-to-royal.html}, language = {English}, urldate = {2023-06-05} } Investigating BlackSuit Ransomware’s Similarities to Royal
BlackSuit BlackSuit
2023-05-12cybleCyble
@online{cyble:20230512:blacksuit:1dbdf02, author = {Cyble}, title = {{BlackSuit Ransomware Strikes Windows and Linux Users}}, date = {2023-05-12}, organization = {cyble}, url = {https://blog.cyble.com/2023/05/12/blacksuit-ransomware-strikes-windows-and-linux-users/}, language = {English}, urldate = {2023-06-05} } BlackSuit Ransomware Strikes Windows and Linux Users
BlackSuit BlackSuit
Yara Rules
[TLP:WHITE] win_blacksuit_auto (20230715 | Detects win.blacksuit.)
rule win_blacksuit_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2023-07-11"
        version = "1"
        description = "Detects win.blacksuit."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.blacksuit"
        malpedia_rule_date = "20230705"
        malpedia_hash = "42d0574f4405bd7d2b154d321d345acb18834a41"
        malpedia_version = "20230715"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { ff7604 e8???????? 8b442418 83c404 897e04 85c0 7508 }
            // n = 7, score = 100
            //   ff7604               | push                dword ptr [esi + 4]
            //   e8????????           |                     
            //   8b442418             | mov                 eax, dword ptr [esp + 0x18]
            //   83c404               | add                 esp, 4
            //   897e04               | mov                 dword ptr [esi + 4], edi
            //   85c0                 | test                eax, eax
            //   7508                 | jne                 0xa

        $sequence_1 = { e8???????? 83c404 50 8d4508 50 e8???????? 83c40c }
            // n = 7, score = 100
            //   e8????????           |                     
            //   83c404               | add                 esp, 4
            //   50                   | push                eax
            //   8d4508               | lea                 eax, [ebp + 8]
            //   50                   | push                eax
            //   e8????????           |                     
            //   83c40c               | add                 esp, 0xc

        $sequence_2 = { c74610f0e1d2c3 e8???????? 83c418 85c0 7e64 0f2805???????? 8d442408 }
            // n = 7, score = 100
            //   c74610f0e1d2c3       | mov                 dword ptr [esi + 0x10], 0xc3d2e1f0
            //   e8????????           |                     
            //   83c418               | add                 esp, 0x18
            //   85c0                 | test                eax, eax
            //   7e64                 | jle                 0x66
            //   0f2805????????       |                     
            //   8d442408             | lea                 eax, [esp + 8]

        $sequence_3 = { 891f 8b5c2428 894708 8b442424 89470c 895f10 ff7510 }
            // n = 7, score = 100
            //   891f                 | mov                 dword ptr [edi], ebx
            //   8b5c2428             | mov                 ebx, dword ptr [esp + 0x28]
            //   894708               | mov                 dword ptr [edi + 8], eax
            //   8b442424             | mov                 eax, dword ptr [esp + 0x24]
            //   89470c               | mov                 dword ptr [edi + 0xc], eax
            //   895f10               | mov                 dword ptr [edi + 0x10], ebx
            //   ff7510               | push                dword ptr [ebp + 0x10]

        $sequence_4 = { f6c202 7412 85ff 750e 5f 5e b826270000 }
            // n = 7, score = 100
            //   f6c202               | test                dl, 2
            //   7412                 | je                  0x14
            //   85ff                 | test                edi, edi
            //   750e                 | jne                 0x10
            //   5f                   | pop                 edi
            //   5e                   | pop                 esi
            //   b826270000           | mov                 eax, 0x2726

        $sequence_5 = { e8???????? 83c408 39742410 0f8484000000 8b6c2418 397504 7466 }
            // n = 7, score = 100
            //   e8????????           |                     
            //   83c408               | add                 esp, 8
            //   39742410             | cmp                 dword ptr [esp + 0x10], esi
            //   0f8484000000         | je                  0x8a
            //   8b6c2418             | mov                 ebp, dword ptr [esp + 0x18]
            //   397504               | cmp                 dword ptr [ebp + 4], esi
            //   7466                 | je                  0x68

        $sequence_6 = { e8???????? 50 53 e8???????? 83c40c 85c0 745e }
            // n = 7, score = 100
            //   e8????????           |                     
            //   50                   | push                eax
            //   53                   | push                ebx
            //   e8????????           |                     
            //   83c40c               | add                 esp, 0xc
            //   85c0                 | test                eax, eax
            //   745e                 | je                  0x60

        $sequence_7 = { ff30 e8???????? 83c404 3db8040000 7f65 7435 3d89020000 }
            // n = 7, score = 100
            //   ff30                 | push                dword ptr [eax]
            //   e8????????           |                     
            //   83c404               | add                 esp, 4
            //   3db8040000           | cmp                 eax, 0x4b8
            //   7f65                 | jg                  0x67
            //   7435                 | je                  0x37
            //   3d89020000           | cmp                 eax, 0x289

        $sequence_8 = { 8b6c2438 56 57 68???????? 6a0b ff7500 e8???????? }
            // n = 7, score = 100
            //   8b6c2438             | mov                 ebp, dword ptr [esp + 0x38]
            //   56                   | push                esi
            //   57                   | push                edi
            //   68????????           |                     
            //   6a0b                 | push                0xb
            //   ff7500               | push                dword ptr [ebp]
            //   e8????????           |                     

        $sequence_9 = { 8bf0 83c414 85f6 0f8495010000 55 e8???????? 8b8c2494000000 }
            // n = 7, score = 100
            //   8bf0                 | mov                 esi, eax
            //   83c414               | add                 esp, 0x14
            //   85f6                 | test                esi, esi
            //   0f8495010000         | je                  0x19b
            //   55                   | push                ebp
            //   e8????????           |                     
            //   8b8c2494000000       | mov                 ecx, dword ptr [esp + 0x94]

    condition:
        7 of them and filesize < 4764672
}
Download all Yara Rules