S1068 BlackCat
BlackCat is ransomware written in Rust that has been offered via the Ransomware-as-a-Service (RaaS) model. First observed November 2021, BlackCat has been used to target multiple sectors and organizations in various countries and regions in Africa, the Americas, Asia, Australia, and Europe.321
Item | Value |
---|---|
ID | S1068 |
Associated Names | ALPHV, Noberus |
Type | MALWARE |
Version | 1.0 |
Created | 28 February 2023 |
Last Modified | 17 April 2023 |
Navigation Layer | View In ATT&CK® Navigator |
Associated Software Descriptions
Name | Description |
---|---|
ALPHV | 31 |
Noberus | 1 |
Techniques Used
Domain | ID | Name | Use |
---|---|---|---|
enterprise | T1548 | Abuse Elevation Control Mechanism | - |
enterprise | T1548.002 | Bypass User Account Control | BlackCat can bypass UAC to escalate privileges.3 |
enterprise | T1134 | Access Token Manipulation | BlackCat has the ability modify access tokens.32 |
enterprise | T1087 | Account Discovery | - |
enterprise | T1087.002 | Domain Account | BlackCat can utilize net use commands to identify domain users.3 |
enterprise | T1059 | Command and Scripting Interpreter | - |
enterprise | T1059.003 | Windows Command Shell | BlackCat can execute commands on a compromised network with the use of cmd.exe .3 |
enterprise | T1486 | Data Encrypted for Impact | BlackCat has the ability to encrypt Windows devices, Linux devices, and VMWare instances.3 |
enterprise | T1491 | Defacement | - |
enterprise | T1491.001 | Internal Defacement | BlackCat can change the desktop wallpaper on compromised hosts.32 |
enterprise | T1561 | Disk Wipe | - |
enterprise | T1561.001 | Disk Content Wipe | BlackCat has the ability to wipe VM snapshots on compromised networks.32 |
enterprise | T1083 | File and Directory Discovery | BlackCat can enumerate files for encryption.3 |
enterprise | T1222 | File and Directory Permissions Modification | - |
enterprise | T1222.001 | Windows File and Directory Permissions Modification | BlackCat can use Windows commands such as fsutil behavior set SymLinkEvaluation R2L:1 to redirect file system access to a different location after gaining access into compromised networks.3 |
enterprise | T1070 | Indicator Removal | - |
enterprise | T1070.001 | Clear Windows Event Logs | BlackCat can clear Windows event logs using wevtutil.exe .3 |
enterprise | T1490 | Inhibit System Recovery | BlackCat can delete shadow copies using vssadmin.exe delete shadows /all /quiet and wmic.exe Shadowcopy Delete ; it can also modify the boot loader using bcdedit /set {default} recoveryenabled No .3 |
enterprise | T1570 | Lateral Tool Transfer | BlackCat can replicate itself across connected servers via psexec .3 |
enterprise | T1112 | Modify Registry | BlackCat has the ability to add the following registry key on compromised networks to maintain persistence: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services \LanmanServer\Paramenters 3 |
enterprise | T1135 | Network Share Discovery | BlackCat has the ability to discover network shares on compromised networks.32 |
enterprise | T1069 | Permission Groups Discovery | - |
enterprise | T1069.002 | Domain Groups | BlackCat can determine if a user on a compromised host has domain admin privileges.3 |
enterprise | T1018 | Remote System Discovery | BlackCat can broadcasts NetBIOS Name Service (NBNC) messages to search for servers connected to compromised networks.3 |
enterprise | T1489 | Service Stop | BlackCat has the ability to stop VM services on compromised networks.32 |
enterprise | T1082 | System Information Discovery | BlackCat can obtain the computer name and UUID, and enumerate local drives.3 |
enterprise | T1033 | System Owner/User Discovery | BlackCat can utilize net use commands to discover the user name on a compromised host.3 |
enterprise | T1047 | Windows Management Instrumentation | BlackCat can use wmic.exe to delete shadow copies on compromised networks.3 |
References
-
Australian Cyber Security Centre. (2022, April 14). 2022-004: ACSC Ransomware Profile - ALPHV (aka BlackCat). Retrieved December 20, 2022. ↩↩↩
-
Brandt, Andrew. (2022, July 14). BlackCat ransomware attacks not merely a byproduct of bad luck. Retrieved December 20, 2022. ↩↩↩↩↩↩
-
Microsoft Defender Threat Intelligence. (2022, June 13). The many lives of BlackCat ransomware. Retrieved December 20, 2022. ↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩