09 June 2023

Correlation between BlackSuit and Royal

Articles

This week, GLIMPS’ CTI team had the opportunity to analyze a new ransomware: BlackSuit. Thanks to GLIMPS Malware’s datasets functionality we were able to highlight the correlation between BlackSuit & Royal (the latter being very present in recent weeks).

Building a dataset

By keeping abreast of current event, the CTI team was able to build up a dataset containing several strains of the Royal ransomware family. It serves as a reference for this family, and is continually updated as new strains appear.

Strain Analysis

1c849adcccad4643303297fb66bfe81c5536be39a87601d67664af1d14e02b9e

This file was identified by GLIMPS Malware as malicious.

The deep engine analysis indicates that this sample includes functions used in binaries from the Royal family.

This link between BlackSuit and Royal is highlighted by the GLIMPS Malware analysis platform.

A study of strings shows that the ransom note is called README.BlackSuit.txt and that the link contained in it points to the attackers’ storefront belonging to BlackSuit.

Conclusion

It’s hard to say wHether this is a new family, but there are several possible explanations. Is it a source code leak ? Is it a conflict between the players ? Or is it simply a variant ? GLIMPS Malware has however, been able to show a link between these two families.

Appendices

List of files and artifacts
Hash Description
1c849adcccad4643303297fb66bfe81c5536be39a87601d67664af1d14e02b9e Ransomware Elf file

 

List of indicators of compromission
IOC Description
README.BlackSuit.txt Ransom note
http://lockbitaptc2iq4atewz2ise62q63wfktyrl4qtwuk5qax262kgtzjqd[.]onion Ransom payment portal

Do not hesitate to contact us for more information: contact@glimps.re