CymuLab Live: Coming to a city near you!
Register Now
New Gartner® Report: Strategic Roadmap for CTEM
Learn More
Threat Exposure Validation Impact Report 2025
Learn More

A Closer Look At BlackMagic Ransomware

December 12, 2022

Blackmagic ransomware group uses a 64-bit DLL file with a single function that is responsible for executing all the main functionality of BlackMagic ransomware. Upon execution, It calls "sleep()" function multiple times to evade sandbox detection, kills specific processes using taskill, adds a registry key for disabling the task manager, and fetches the victim machines' IP addresses utilizing the ipconfig utility. Once the encryption of the files is complete and the "ransom note" is dropped, It creates a .bat file named "next.bat" and performs various functions like deleting traces, kills some processes, and finally restart the system while also deleting itself.