bottomshape
Table of Contents

BlackLock Ransomware Deep Dive: A Cross-Platform, Double Extortion Threat

Malicious File Summary

Malware FamilyBlackLock
Release DateFebruary 25, 2025
Threat TypeRansomware
Brief DescriptionBlackLock ransomware (also known as El Dorado or Eldorado) emerged in March 2024 and operates under a Ransomware-as-a-Service (RaaS) model. It employs a double extortion strategy—encrypting data and stealing sensitive information—and targets Windows, VMware ESXi, and Linux environments. Victims span various industries and regions.

Sample Analysis

Summary

The sample requires administrator privilege to execute and must be run via the command line; it does not launch via double-click.

Upon execution, the following log is printed:

Ransom note content:HOW_RETURN_YOUR_DATA.TXT

Example of encrypted files:

Analysis

Windows Version

Supported optional parameters for execution:

ParameterDescription
-pathSpecifies the file path to be encrypted
-skip-localSpecifies files to be excluded from encryption
-n <subnet>Specifies shared resources in CIDR format, e.g., 192.168.5.0/24
-d <domain>Specifies the domain
-u <username>Specifies SMB account
-p <password>Specifies SMB password
-skip-netSkips encrypting shared directories

When provided with appropriate user credentials, it can encrypt files on shared networks using the SMB protocol.

Logs are transmitted via WebSockets to 173.44.141[.]152, with the Origin header set to “http://logger”

To eliminate traces, the Eldorado ransomware runs a PowerShell command to overwrite the encryptor executables with random bytes and then deletes the file. If the “-keep” parameter is specified, this action is skipped:

Linux Version

The Linux variant is simpler, supporting only the -path parameter.

It recursively encrypts files within the specified directory using the same encryption algorithm as the Windows version.

Indicators of Compromise (IOC)

SHA256 windows1375e5d7f672bfd43ff7c3e4a145a96b75b66d8040a5c5f98838f6eb0ab9f27b
7f21d5c966f4fd1a042dad5051dfd9d4e7dfed58ca7b78596012f3f122ae66dd
cb0b9e509a0f16eb864277cd76c4dcaa5016a356dd62c04dff8f8d96736174a7
0622aed252556af50b834ae16392555e51d67b3a4c67a6836b98534a0d14d07d
8badf1274da7c2bd1416e2ff8c384348fc42e7d1600bf826c9ad695fb5192c74
SHA256 Linuxb2266ee3c678091874efc3877e1800a500d47582e9d35225c44ad379f12c70de
dc4092a476c29b855a9e5d7211f7272f04f7b4fca22c8ce4c5e4a01f22258c33
Malicious IP173.44.141.152
Ransom Note FilenameHOW_RETURN_YOUR_DATA.TXT
Encrypted File Extensions.63npoxa6、.00000001
Dark Web URLshttp://dataleakypypu7uwblm5kttv726l3iripago6p336xjnbstkjwrlnlid.onion
Dark Web URLshttp://panela3eefdzfzxzxcshfnbustdprtlhlbe3x2fqomdz7t33iqtzvjyd.onion/Url=ddb34da5-dce4-4b46-8f7d-4674ab38be9d
Commandlinevssadmin delete shadows /all /quiet
Directories Excluded from EncryptionWindows, programdata, program files, program files (x86), $recycle.bin, all users, winnt, appdata, application data, local settings, boot
Files Excluded from Encryptionntldr, ntdetect.com, autoexec.bat, ntuser.dat, ntuser.dat.log, iconcache.db, bootsect.bak, bootfont.bin, bootmgr, thumbs.db
File Extensions Excluded from Encryption.00000001, .exe, .dll, .sys, .msi, .ini, .inf, .lnk,.63npoxa6

Share This Article

Related Posts

What is Attack Surface Management? 
29 Apr, 2025
What is Attack Surface Management? 
Digital transformations, acquisitions, and downsizing impact the organization’s attack surface.  Hackers using adversarial artificial intelligence (AI) and machine learning (ML)...
Advanced Persistent Threats: Protecting German Manufacturing with Managed Detection and Response
09 Apr, 2025
Advanced Persistent Threats: Protecting German Manufacturing with Managed Detection and Response
Advanced Persistent Threats, or APTs, are attacks that breach networks to gain access to valuable data. To put into scope...
Reducing the Risk of Manufacturing Cyberattacks With Managed Detection and Response
09 Apr, 2025
Reducing the Risk of Manufacturing Cyberattacks With Managed Detection and Response
The industrial 4.0 and 5.0 manufacturing industry continues to become fully automated, using robotics and additional advanced technology sensors with...