Hello,
We are facing with a new ransom named "Blackbyte"
We don't find any information about that, in google, duckduckgo or dark web.
Anyone has more details?
Attached Files
Edited by quietman7, 19 September 2021 - 04:14 PM.
Posted 19 July 2021 - 08:20 AM
Hello,
We are facing with a new ransom named "Blackbyte"
We don't find any information about that, in google, duckduckgo or dark web.
Anyone has more details?
Edited by quietman7, 19 September 2021 - 04:14 PM.
Posted 19 July 2021 - 10:43 AM
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015 
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 19 July 2021 - 04:12 PM
Hello, andgx
Hello, thomascnk
Put the 'BlackByte_restoremyfiles.hta' file in the archive with the password 'note123' and attach it to the forum message.
Some antiviruses, cloud services and forum protection can delete the hta file as dangerous.
Therefore, it must be archived with a password.
You can also transfer the file through a sharing site, For example, this https://dropmefiles.com/
Just drag the file to the site, do not enter any addresses or contacts.
Edited by Amigo-A, 20 July 2021 - 06:44 AM.
My site: The Digest "Crypto-Ransomware" + Google Translate
Posted 19 July 2021 - 05:43 PM
Likely new, only seeing two IPs submitted to ID Ransomware so far. Need the malware executable to analyze.
ID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]
RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]
CryptoSearch - Find Files Encrypted by Ransomware [Support Topic]
If I have helped you and you wish to support my ransomware fighting, you may support me here.
Posted 03 August 2021 - 04:38 PM
do u have sql files , virtual image files or compressed files to needed?
Posted 18 September 2021 - 09:22 AM
Likely new, only seeing two IPs submitted to ID Ransomware so far. Need the malware executable to analyze.
Malware maybe the script file (obamka.js), run with the help of wscript.exe. It has self destroyed function and run as scheduled task.
I uploaded the sample encrypted file and ransom note.
https://www.mediafire.com/file/gmccf0gard6yhzr/BlackByte.rar/file
Edited by MyoMyintHtike, 18 September 2021 - 09:33 AM.
Posted 19 September 2021 - 04:10 AM
My site: The Digest "Crypto-Ransomware" + Google Translate
Posted 19 September 2021 - 04:29 AM
Dear MyoMyintHtike
If you have the opportunity to upload files from the screenshot (highlighted with a red line), then put them in an archive with a password (your login on the forum) and give me a link to PM using the exchange site.
Edited by Amigo-A, 19 September 2021 - 04:33 AM.
My site: The Digest "Crypto-Ransomware" + Google Translate
Posted 19 September 2021 - 08:41 AM
Topic title changed to reflect naming convention and direct other victims to this support topic.
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015 
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 20 September 2021 - 01:31 AM
Dear MyoMyintHtike
If you have the opportunity to upload files from the screenshot (highlighted with a red line), then put them in an archive with a password (your login on the forum) and give me a link to PM using the exchange site.
Threat actors deleted obamka.js file in all servers.
Fortunately, I got obamka.js file from one AD Server.
I uploaded and sent to you. Please check PM. (In attachment file, the autorun file (.arn) already included)
Posted 20 September 2021 - 09:51 AM
I downloaded it, thanks.
JS loader is unfortunately not supported. Need to use a real PC online.
My site: The Digest "Crypto-Ransomware" + Google Translate
Posted 20 September 2021 - 10:02 AM
Hi!
From a computer that was encrypted by BlackByte I got an "1709.exe" with an icon of Mr.Death, is that something that will help you to investigate this ransomware?
Also on this Computer I can see a lot of processes "wordpad.exe /p c:\bb.dll" all startet by an invisible cms process.
There is one additional thing that makes me wonder, there are a lot of large files encrypted within the same minute on an slow attached NAS, so that is looks as there were only some bytes written to the beginning, or the end of the file, is that possible
Regards
Posted 20 September 2021 - 11:11 PM
Posted 21 September 2021 - 04:46 AM
is that possible
Yes, it is possible. It will be nice if a lot of files are not encrypted or damaged.
Edited by Amigo-A, 21 September 2021 - 04:50 AM.
My site: The Digest "Crypto-Ransomware" + Google Translate
0 members, 1 guests, 0 anonymous users