Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

BlackMatter

107
Global rank
98 infographic chevron month
Month rank
89 infographic chevron week
Week rank
0
IOCs

BlackMatter is a ransomware strain operating as a Ransomware-as-a-Service (RaaS), designed to encrypt files, remove recovery options, and extort victims across critical industries. Emerging in 2021, it quickly became a major concern due to its ability to evade defenses, spread across networks, and cause large-scale operational disruption, forcing security teams to act against a highly destructive and persistent threat.

Ransomware
Type
Unknown
Origin
1 August, 2021
First seen
29 January, 2026
Last seen

How to analyze BlackMatter with ANY.RUN

Type
Unknown
Origin
1 August, 2021
First seen
29 January, 2026
Last seen

IOCs

IP addresses
165.22.84.147
159.89.128.13
157.230.28.192
Domains
paymenthacks.com
mojobiden.com
nowautomation.com
test.white-datasheet.com
supp24yy6a66hwszu2piygicgwzdtbwftb76htj7vnip3getgqnzxid.onion
supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion
blackmax7su6mbwtcyo3xwtpfxpm356jjqrs34y4crcytpw7mifuedyd.onion
fluentzip.org
Last Seen at
Last Seen at

Recent blog posts

post image
SOC & Business Success with ANY.RUN: Real...
watchers 1311
comments 0
post image
Attackers Are Taking Over Real Email Threads...
watchers 4189
comments 0
post image
Fix Staff Shortage & Burnout in Your SOC...
watchers 1032
comments 0

What is BlackMatter Ransomware?

BlackMatter, first identified in mid-2021, is a ransomware strain operating under the Ransomware-as-a-Service (RaaS) model. It is designed to target organizations across multiple industries, including healthcare, telecommunications, finance, education, government, and other critical infrastructure, making it one of the more disruptive threats in circulation.

In contrast to opportunistic ransomware, BlackMatter is deployed strategically. Once active, it encrypts files on both local and network resources, disables recovery mechanisms, and prevents victims from restoring data without negotiating with the attackers.

The malware features advanced evasion capabilities, such as Safe Mode encryption, partial file encryption to accelerate attacks, and anti-debugging techniques. It leverages a hybrid cryptographic approach, Salsa20 for file content and RSA-1024 for session keys, to lock data securely while remaining under detection thresholds.

Since its emergence, BlackMatter has been observed in both Windows and Linux campaigns, with incidents continuing into 2025. Its operators often deliver the ransomware via phishing emails, malicious attachments, or by exploiting stolen credentials to move laterally through a network.

Attackers commonly spread BlackMatter through:

  • Phishing emails carrying malicious attachments or links
  • Compromised websites and malvertising campaigns
  • Trojanized installers posing as legitimate software
  • Exploitation of valid user credentials for lateral movement
  • Abuse of administrative tools and system utilities (e.g., PowerShell, net.exe, sc.exe)

Like other modern ransomware families, BlackMatter often disguises its processes under legitimate Windows services (such as svchost.exe) to evade detection and maintain persistence within the system.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

BlackMatter Victimology

BlackMatter ransomware campaigns were notable for targeting large enterprises and critical infrastructure rather than indiscriminate attacks on individuals. Although the group publicly claimed to avoid healthcare and government sectors, many victims still came from sensitive industries.

Typical targets included:

  • Financial services and banking institutions
  • Energy and utilities providers
  • Telecommunications and technology companies
  • Manufacturing and logistics firms
  • Educational organizations
  • Regional and local government entities

The ransomware was distributed globally, with most confirmed victims in North America, Europe, and Asia. Reported ransom demands ranged from $80,000 to $30 million, with attackers typically requiring cryptocurrency payments.

Some of the most high-profile cases included:

  • NEW Cooperative (Iowa, USA): In September 2021, BlackMatter demanded $5.9 million, disrupting agricultural operations.
  • Olympus Corporation (Japan): In the same month, the gang reportedly demanded $30 million, one of the highest known ransom figures attributed to BlackMatter.

The group struck more than 50 organizations in just four months of active operations, with an average ransom demand of $5.3 million.

Despite its short lifespan after launching in mid-2021, BlackMatter quickly built a reputation as one of the most prolific ransomware operations of its time. Following law enforcement pressure and a wave of arrests in Europe, the operators announced their shutdown in November 2021. Still, successor activity, blending tactics from DarkSide and REvil, ensured that organizations across multiple sectors continued to face derivative campaigns into 2025.

BlackMatter Typical Attack Chain

There are numerous BlackMatter ransomware samples detonated in ANY.RUN’s Interactive Sandbox and analyzed by SOC teams worldwide. Let’s walk through how a typical infection unfolds.

View analysis session with BlackMatter RAT

BlackMatter RAT analysis in Sandbox

BlackMatter RAT analyzed inside ANY.RUN sandbox

Once executed, BlackMatter begins with a system check, creates the mutex Global\SystemUpdate_svchost.exe, copies itself into a new directory, and registers for autorun to ensure persistence. It then bypasses UAC, escalates privileges, and modifies the PowerShell execution policy to allow malicious commands to run without restriction.

Next comes the destructive preparation stage. The ransomware deletes shadow copies and backups (vssadmin, wbadmin), disables the Windows Recovery Environment (reagentc), and modifies boot configuration settings (bcdedit) to prevent recovery. In parallel threads, it uses net.exe and sc.exe to stop critical services and applications such as antivirus software, SQL databases, and backup tools, clearing the way for uninterrupted encryption.

BlackMatter TTPs analysis in Sandbox

Relevant TTPs displayed inside ANY.RUN sandbox

Finally, BlackMatter scans local and network drives, encrypts files with its own extension, and drops ransom notes with payment instructions in every affected directory. It also replaces the victim’s desktop background with a warning message, pointing to the ransom note for further details.

BlackMatter ransom note in SandboxRansom note displayed inside ANY.RUN’s sandbox

What BlackMatter Can Do to a System

Once deployed, BlackMatter executes a destructive sequence designed to ensure full control and maximum damage. Its capabilities include:

  • Stealth and Masquerading: Runs malicious components under svchost.exe to disguise activity and creates a unique mutex (Global\SystemUpdate_svchost.exe) to prevent multiple instances.
  • System Reconnaissance: Collects system details such as computer name, Machine GUID, Windows installation date, and language settings. It also retrieves browser security parameters to understand the environment.

BlackMatter system info discovery

System information discovery, including computer name, Machine GUID and language settings

  • Privilege Escalation: Bypasses UAC using fodhelper.exe and modifies registry keys to execute with elevated privileges. It also forces PowerShell execution policy to Bypass, ensuring malicious scripts can run unhindered.
  • Persistence: Adds itself to autorun via registry keys and creates scheduled tasks with elevated rights, allowing the ransomware to survive reboots and maintain long-term access.

BlackMatter scheduled task creation

Creation of scheduled task exposed inside ANY.RUN sandbox

  • Recovery Elimination: Deletes shadow copies with vssadmin.exe, removes backups via wbadmin.exe, disables Windows Recovery Environment using reagentc.exe, and alters boot settings with bcdedit.exe to block system restoration.
  • Service and Network Control: Uses sc.exe and net.exe to terminate antivirus tools, databases, and critical services, while probing proxy settings and network shares to prepare for lateral movement.

BlackMatter service control in Sandbox

Sc.exe and net.exe used for service control

  • Scripted Automation: Runs malicious .bat files and leverages timeout.exe to synchronize operations and evade heuristic defenses.

BlackMatter malicious files in Sandbox

Malicious .bat files visible inside ANY.RUN’s sandbox

  • Encryption: Finally, BlackMatter encrypts local and network files, appends its custom extension, and drops ransom notes in each affected directory, ensuring victims are aware that restoration is impossible without paying.

How BlackMatter Functions

BlackMatter is built for speed and disruption rather than long-term control. Its architecture combines:

  • Pre-encryption sabotage, where backup tools and recovery features are disabled to ensure data cannot be restored.
  • Fast encryption logic, using Salsa20 for file content and RSA-1024 for keys, with partial file encryption to lock large volumes quickly.
  • Victim communication infrastructure, where ransom notes direct organizations to attacker-controlled portals for negotiation and payment.

This streamlined design allows attackers to cripple organizations in a short window of access, leaving defenders with almost no opportunity to intervene once execution begins.

How BlackMatter Threatens Businesses and Organizations

For organizations, BlackMatter ransomware poses a severe threat that extends far beyond the encryption of individual files. Its design ensures maximum operational disruption, financial loss, and reputational damage.

  1. Complete Data Inaccessibility: BlackMatter encrypts both local and network resources while simultaneously removing recovery options like shadow copies and backups. This ensures organizations face a sudden and total loss of access to business-critical data.
  2. Rapid Spread Across Infrastructure: Because it can leverage administrative tools (net.exe, sc.exe) and stolen credentials, BlackMatter often moves laterally within networks. This allows attackers to cripple not just a single endpoint but entire domains, file servers, and NAS devices.
  3. Critical Service Shutdowns: By stopping antivirus engines, SQL databases, and other core services, the ransomware halts operational systems that businesses depend on daily, from transaction processing to logistics management.
  4. High-Value Extortion: With ransom demands ranging from $80,000 to $30 million, BlackMatter has directly targeted enterprises with high revenues and valuable data. This level of financial pressure, combined with the threat of leaked stolen files, forces executives into making urgent, high-stakes decisions.
  5. Sector-Specific Impact: Attacks against agriculture (e.g., NEW Cooperative in 2021) and healthcare technology (e.g., Olympus) demonstrated that ransomware is not just an IT problem, it can disrupt food supply chains, delay medical services, and destabilize critical infrastructure.
  6. Long-Term Business Consequences: Even after restoration, organizations may face weeks of downtime, lost contracts, reputational damage, and regulatory scrutiny. In some cases, disruption caused by ransomware like BlackMatter can threaten the long-term viability of smaller businesses.

Gathering Threat Intelligence on BlackMatter

Integrating threat intelligence into security operations is essential for detecting and mitigating BlackMatter attacks. Threat intelligence provides fresh indicators of compromise (IOCs), such as malicious IP addresses, domains, and file hashes, that can be used to block command-and-control infrastructure and monitor for early signs of compromise.

It also supports proactive threat hunting, enabling SOC teams to look for BlackMatter’s presence before encryption begins. Detection can rely on known behaviors, including registry modifications for persistence, use of tools like vssadmin and bcdedit for recovery elimination, and service control via sc.exe and net.exe.

Start gathering IOCs and behavioral data with the malware name search request to Threat Intelligence Lookup:

threatName:"Blackmatter"

BlackMatter samples in TI Lookup BlackMatter ransomware samples found via TI Lookup

Integrate ANY.RUN’s threat intelligence solutions in your company

Contact us

Conclusion

BlackMatter highlights how ransomware groups now operate like professional businesses, capable of paralyzing entire organizations in hours. By wiping recovery options, halting services, and demanding multimillion-dollar ransoms, it forces executives, IT teams, and SOC analysts into crisis mode.

For security leaders, this means preparing not just technically but organizationally: ensuring SOC teams can spot ransomware behaviors early, aligning with legal and communications teams for incident response, and protecting brand trust when critical services are disrupted.

Staying ahead requires threat intelligence that goes beyond file signatures; context on attacker tactics, visibility into live campaigns, and shared IOCs that teams can act on quickly.

Gather fresh actionable threat intelligence via ANY.RUN’s TI Lookup: start with 50 trial requests.

HAVE A LOOK AT

EvilProxy screenshot
EvilProxy
evilproxy
EvilProxy is a phishing-as-a-service (PhaaS) platform that enables cybercriminals to bypass multi-factor authentication (MFA) and hijack user sessions. It leverages reverse proxy techniques to harvest credentials and session cookies, posing a serious threat to both individuals and enterprises.
Read More
Bumblebee Loader screenshot
Bumblebee Loader
bumblebee
Bumblebee is a highly adaptable malware loader, often used by threat actors linked to the Conti and TrickBot cybercrime groups. Since its discovery in 2021, Bumblebee has been leveraged in phishing campaigns and email thread hijacking, primarily to distribute payloads like Cobalt Strike and ransomware. The malware employs obfuscation techniques, such as DLL injection and virtual environment detection, to avoid detection and sandbox analysis. Its command-and-control infrastructure and anti-analysis features allow it to persist on infected devices, where it enables further payload downloads and system compromise.
Read More
ACR Stealer screenshot
ACR Stealer is a modern information-stealing malware designed to harvest sensitive data from infected devices. Like other infostealers, it targets credentials, financial details, browser data, and files, enabling cybercriminals to monetize stolen information through direct fraud or underground market sales.
Read More
SSLoad screenshot
SSLoad
ssload
SSLoad is a malicious loader or downloader that is used to infiltrate target systems through phishing emails, perform reconnaissance and transmit it back to its operators delivering malicious payloads. To avoid detection, SSLoad employs various encryption methods and delivery techniques highlighting its versatile nature and complexity. It is believed to be a part of Malware-as-a-Service (MaaS) operation given its diverse delivery methods and implemented techniques.
Read More
Virlock screenshot
Virlock
virlock
Virlock is a unique ransomware strain that combines encryption capabilities with file infection techniques. First observed in 2014, it stands out due to its polymorphic nature and ability to embed its code into compromised files, ensuring continued propagation. Once it infects a system, it encrypts files and locks the screen, demanding a ransom for file recovery and system access.
Read More
SalatStealer screenshot
SalatStealer
salatstealer
SalatStealer, also known as WEB_RAT or Salat Stealer, is a Go-based information-stealing malware targeting Windows systems. It operates as a Malware-as-a-Service (MaaS) focusing on harvesting browser credentials, cryptocurrency wallets, and session data from popular applications like Telegram and Steam.
Read More