Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

BlackMatter

106
Global rank
105 infographic chevron month
Month rank
158 infographic chevron week
Week rank
0
IOCs

BlackMatter is a ransomware strain operating as a Ransomware-as-a-Service (RaaS), designed to encrypt files, remove recovery options, and extort victims across critical industries. Emerging in 2021, it quickly became a major concern due to its ability to evade defenses, spread across networks, and cause large-scale operational disruption, forcing security teams to act against a highly destructive and persistent threat.

Ransomware
Type
Unknown
Origin
1 August, 2021
First seen
9 December, 2025
Last seen

How to analyze BlackMatter with ANY.RUN

Type
Unknown
Origin
1 August, 2021
First seen
9 December, 2025
Last seen

IOCs

IP addresses
157.230.28.192
159.89.128.13
Domains
paymenthacks.com
mojobiden.com
nowautomation.com
test.white-datasheet.com
supp24yy6a66hwszu2piygicgwzdtbwftb76htj7vnip3getgqnzxid.onion
supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion
blackmax7su6mbwtcyo3xwtpfxpm356jjqrs34y4crcytpw7mifuedyd.onion
fluentzip.org
Last Seen at
Last Seen at

Recent blog posts

post image
Year in Review by ANY.RUN: Key Threats, Solut...
watchers 2384
comments 0
post image
5 Ways Threat Intelligence Drives ROI in SOCs...
watchers 481
comments 0
post image
SOC Leader’s Playbook: 3 Practical Steps to F...
watchers 495
comments 0

What is BlackMatter Ransomware?

BlackMatter, first identified in mid-2021, is a ransomware strain operating under the Ransomware-as-a-Service (RaaS) model. It is designed to target organizations across multiple industries, including healthcare, telecommunications, finance, education, government, and other critical infrastructure, making it one of the more disruptive threats in circulation.

In contrast to opportunistic ransomware, BlackMatter is deployed strategically. Once active, it encrypts files on both local and network resources, disables recovery mechanisms, and prevents victims from restoring data without negotiating with the attackers.

The malware features advanced evasion capabilities, such as Safe Mode encryption, partial file encryption to accelerate attacks, and anti-debugging techniques. It leverages a hybrid cryptographic approach, Salsa20 for file content and RSA-1024 for session keys, to lock data securely while remaining under detection thresholds.

Since its emergence, BlackMatter has been observed in both Windows and Linux campaigns, with incidents continuing into 2025. Its operators often deliver the ransomware via phishing emails, malicious attachments, or by exploiting stolen credentials to move laterally through a network.

Attackers commonly spread BlackMatter through:

  • Phishing emails carrying malicious attachments or links
  • Compromised websites and malvertising campaigns
  • Trojanized installers posing as legitimate software
  • Exploitation of valid user credentials for lateral movement
  • Abuse of administrative tools and system utilities (e.g., PowerShell, net.exe, sc.exe)

Like other modern ransomware families, BlackMatter often disguises its processes under legitimate Windows services (such as svchost.exe) to evade detection and maintain persistence within the system.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

BlackMatter Victimology

BlackMatter ransomware campaigns were notable for targeting large enterprises and critical infrastructure rather than indiscriminate attacks on individuals. Although the group publicly claimed to avoid healthcare and government sectors, many victims still came from sensitive industries.

Typical targets included:

  • Financial services and banking institutions
  • Energy and utilities providers
  • Telecommunications and technology companies
  • Manufacturing and logistics firms
  • Educational organizations
  • Regional and local government entities

The ransomware was distributed globally, with most confirmed victims in North America, Europe, and Asia. Reported ransom demands ranged from $80,000 to $30 million, with attackers typically requiring cryptocurrency payments.

Some of the most high-profile cases included:

  • NEW Cooperative (Iowa, USA): In September 2021, BlackMatter demanded $5.9 million, disrupting agricultural operations.
  • Olympus Corporation (Japan): In the same month, the gang reportedly demanded $30 million, one of the highest known ransom figures attributed to BlackMatter.

The group struck more than 50 organizations in just four months of active operations, with an average ransom demand of $5.3 million.

Despite its short lifespan after launching in mid-2021, BlackMatter quickly built a reputation as one of the most prolific ransomware operations of its time. Following law enforcement pressure and a wave of arrests in Europe, the operators announced their shutdown in November 2021. Still, successor activity, blending tactics from DarkSide and REvil, ensured that organizations across multiple sectors continued to face derivative campaigns into 2025.

BlackMatter Typical Attack Chain

There are numerous BlackMatter ransomware samples detonated in ANY.RUN’s Interactive Sandbox and analyzed by SOC teams worldwide. Let’s walk through how a typical infection unfolds.

View analysis session with BlackMatter RAT

BlackMatter RAT analysis in Sandbox

BlackMatter RAT analyzed inside ANY.RUN sandbox

Once executed, BlackMatter begins with a system check, creates the mutex Global\SystemUpdate_svchost.exe, copies itself into a new directory, and registers for autorun to ensure persistence. It then bypasses UAC, escalates privileges, and modifies the PowerShell execution policy to allow malicious commands to run without restriction.

Next comes the destructive preparation stage. The ransomware deletes shadow copies and backups (vssadmin, wbadmin), disables the Windows Recovery Environment (reagentc), and modifies boot configuration settings (bcdedit) to prevent recovery. In parallel threads, it uses net.exe and sc.exe to stop critical services and applications such as antivirus software, SQL databases, and backup tools, clearing the way for uninterrupted encryption.

BlackMatter TTPs analysis in Sandbox

Relevant TTPs displayed inside ANY.RUN sandbox

Finally, BlackMatter scans local and network drives, encrypts files with its own extension, and drops ransom notes with payment instructions in every affected directory. It also replaces the victim’s desktop background with a warning message, pointing to the ransom note for further details.

BlackMatter ransom note in SandboxRansom note displayed inside ANY.RUN’s sandbox

What BlackMatter Can Do to a System

Once deployed, BlackMatter executes a destructive sequence designed to ensure full control and maximum damage. Its capabilities include:

  • Stealth and Masquerading: Runs malicious components under svchost.exe to disguise activity and creates a unique mutex (Global\SystemUpdate_svchost.exe) to prevent multiple instances.
  • System Reconnaissance: Collects system details such as computer name, Machine GUID, Windows installation date, and language settings. It also retrieves browser security parameters to understand the environment.

BlackMatter system info discovery

System information discovery, including computer name, Machine GUID and language settings

  • Privilege Escalation: Bypasses UAC using fodhelper.exe and modifies registry keys to execute with elevated privileges. It also forces PowerShell execution policy to Bypass, ensuring malicious scripts can run unhindered.
  • Persistence: Adds itself to autorun via registry keys and creates scheduled tasks with elevated rights, allowing the ransomware to survive reboots and maintain long-term access.

BlackMatter scheduled task creation

Creation of scheduled task exposed inside ANY.RUN sandbox

  • Recovery Elimination: Deletes shadow copies with vssadmin.exe, removes backups via wbadmin.exe, disables Windows Recovery Environment using reagentc.exe, and alters boot settings with bcdedit.exe to block system restoration.
  • Service and Network Control: Uses sc.exe and net.exe to terminate antivirus tools, databases, and critical services, while probing proxy settings and network shares to prepare for lateral movement.

BlackMatter service control in Sandbox

Sc.exe and net.exe used for service control

  • Scripted Automation: Runs malicious .bat files and leverages timeout.exe to synchronize operations and evade heuristic defenses.

BlackMatter malicious files in Sandbox

Malicious .bat files visible inside ANY.RUN’s sandbox

  • Encryption: Finally, BlackMatter encrypts local and network files, appends its custom extension, and drops ransom notes in each affected directory, ensuring victims are aware that restoration is impossible without paying.

How BlackMatter Functions

BlackMatter is built for speed and disruption rather than long-term control. Its architecture combines:

  • Pre-encryption sabotage, where backup tools and recovery features are disabled to ensure data cannot be restored.
  • Fast encryption logic, using Salsa20 for file content and RSA-1024 for keys, with partial file encryption to lock large volumes quickly.
  • Victim communication infrastructure, where ransom notes direct organizations to attacker-controlled portals for negotiation and payment.

This streamlined design allows attackers to cripple organizations in a short window of access, leaving defenders with almost no opportunity to intervene once execution begins.

How BlackMatter Threatens Businesses and Organizations

For organizations, BlackMatter ransomware poses a severe threat that extends far beyond the encryption of individual files. Its design ensures maximum operational disruption, financial loss, and reputational damage.

  1. Complete Data Inaccessibility: BlackMatter encrypts both local and network resources while simultaneously removing recovery options like shadow copies and backups. This ensures organizations face a sudden and total loss of access to business-critical data.
  2. Rapid Spread Across Infrastructure: Because it can leverage administrative tools (net.exe, sc.exe) and stolen credentials, BlackMatter often moves laterally within networks. This allows attackers to cripple not just a single endpoint but entire domains, file servers, and NAS devices.
  3. Critical Service Shutdowns: By stopping antivirus engines, SQL databases, and other core services, the ransomware halts operational systems that businesses depend on daily, from transaction processing to logistics management.
  4. High-Value Extortion: With ransom demands ranging from $80,000 to $30 million, BlackMatter has directly targeted enterprises with high revenues and valuable data. This level of financial pressure, combined with the threat of leaked stolen files, forces executives into making urgent, high-stakes decisions.
  5. Sector-Specific Impact: Attacks against agriculture (e.g., NEW Cooperative in 2021) and healthcare technology (e.g., Olympus) demonstrated that ransomware is not just an IT problem, it can disrupt food supply chains, delay medical services, and destabilize critical infrastructure.
  6. Long-Term Business Consequences: Even after restoration, organizations may face weeks of downtime, lost contracts, reputational damage, and regulatory scrutiny. In some cases, disruption caused by ransomware like BlackMatter can threaten the long-term viability of smaller businesses.

Gathering Threat Intelligence on BlackMatter

Integrating threat intelligence into security operations is essential for detecting and mitigating BlackMatter attacks. Threat intelligence provides fresh indicators of compromise (IOCs), such as malicious IP addresses, domains, and file hashes, that can be used to block command-and-control infrastructure and monitor for early signs of compromise.

It also supports proactive threat hunting, enabling SOC teams to look for BlackMatter’s presence before encryption begins. Detection can rely on known behaviors, including registry modifications for persistence, use of tools like vssadmin and bcdedit for recovery elimination, and service control via sc.exe and net.exe.

Start gathering IOCs and behavioral data with the malware name search request to Threat Intelligence Lookup:

threatName:"Blackmatter"

BlackMatter samples in TI Lookup BlackMatter ransomware samples found via TI Lookup

Integrate ANY.RUN’s threat intelligence solutions in your company

Contact us

Conclusion

BlackMatter highlights how ransomware groups now operate like professional businesses, capable of paralyzing entire organizations in hours. By wiping recovery options, halting services, and demanding multimillion-dollar ransoms, it forces executives, IT teams, and SOC analysts into crisis mode.

For security leaders, this means preparing not just technically but organizationally: ensuring SOC teams can spot ransomware behaviors early, aligning with legal and communications teams for incident response, and protecting brand trust when critical services are disrupted.

Staying ahead requires threat intelligence that goes beyond file signatures; context on attacker tactics, visibility into live campaigns, and shared IOCs that teams can act on quickly.

Gather fresh actionable threat intelligence via ANY.RUN’s TI Lookup: start with 50 trial requests.

HAVE A LOOK AT

Ramnit screenshot
Ramnit
ramnit
Ramnit is a highly modular banking trojan and worm that evolved from a file-infecting virus into a powerful cybercrime tool. It specializes in financial fraud, credential theft, remote access, and malware delivery, being a serious threat to businesses and individuals. First spotted in 2010, Ramnit became popular after the 2014 takedown of the GameOver Zeus botnet, as cybercriminals sought alternatives for banking fraud.
Read More
SVCStealer screenshot
SVCStealer
svcstealer
SVCStealer is an information-stealing malware targeting sensitive user data through spear-phishing email attachments. It systematically extracts credentials, financial data, and system information from various applications, including browsers and messaging platforms.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
DeerStealer screenshot
DeerStealer
deerstealer
DeerStealer is an information-stealing malware discovered in 2024 by ANY.RUN, primarily targeting sensitive data such as login credentials, browser history, and cryptocurrency wallet details. It is often distributed through phishing campaigns and fake Google ads that mimic legitimate platforms like Google Authenticator. Once installed, it exfiltrates the stolen data to a remote command and control (C2) server. DeerStealer’s ability to disguise itself as legitimate downloads makes it particularly dangerous for unsuspecting users.
Read More
Spynote screenshot
Spynote
spynote
SpyNote, also known as SpyMax and CypherRat, is a powerful Android malware family designed primarily for surveillance and data theft, often categorized as a Remote Access Trojan (RAT). Originally emerged in 2016, SpyNote has evolved significantly, with new variants continuing to appear as recently as 2023–2025.
Read More
NetSupport RAT screenshot
NetSupport RAT
netsupport
NetSupport RAT is a malicious adaptation of the legitimate NetSupport Manager, a remote access tool used for IT support, which cybercriminals exploit to gain unauthorized control over systems. It has gained significant traction due to its sophisticated evasion techniques, widespread distribution campaigns, and the challenge it poses to security professionals who must distinguish between legitimate and malicious uses of the underlying software.
Read More