BlackCat operators introduced a new tool called Munchkin that uses a customized Alpine VM to deploy and propagate the BlackCat payload across remote machines and SMB shares. Unit 42 explains how Munchkin runs inside a VirtualBox VM, decrypts strings at runtime, and generates per-target BlackCat samples to encrypt network shares, highlighting an ongoing evolution of their ransomware-as-a-service model. #BlackCat #Munchkin
Keypoints
- BlackCat releases a new tool, Munchkin, to propagate ransomware to remote SMB/CIFS shares.
- Munchkin runs a customized Alpine VM loaded via VirtualBox to deploy malware and evade host defenses.
-
MITRE Techniques
- [T1497] Virtualization/Sandbox Evasion – Used to run malware inside a VM to circumvent host security; “The Munchkin utility is delivered as an ISO file, which is loaded in a newly installed instance of the VirtualBox virtualization product.”
- [T1021.002] SMB/Windows Admin Shares – Lateral movement by propagating payloads to remote SMB/CIFS shares; “to propagate the BlackCat payload to remote machines and shares on a victim organization network.”
- [T1027] Obfuscated/Encrypted Files and Information – Strings are decrypted at runtime via a single-byte XOR; “the controller will initially decrypt numerous strings using a unique single-byte XOR operation.”
- [T1098] Modify Existing Account – Root password changed on the VM to a threat actor-chosen value; “changes the root password of the VM to one chosen by the threat actors.”
- [T1003] Credential Dumping – Pack includes tools like Mimikatz and numerous Python scripts used for password dumping and credential access; “Attackers can use many of the Python scripts above for lateral movement, password dumping and further execution of malware on the victim network.”
- [T1562] Impair Defenses – Attempts to disable discovery and security measures; “DISABLE_NETWORK” / “Disable automatic network discovery” described in the config.
Indicators of Compromise
- [File Path] Munchkin binary and related components – /app/controller (Munchkin Binary) and /app/payload (BlackCat Stub)
- [File Path] Supporting SMB tooling – /scripts/smb_common.py and /scripts/smb_copy_and_exec.py
- [File Hash] – 1a4082c161eafde7e367e0ea2c98543c06dce667b547881455d1984037a90e7d
- [File Hash] – b4dd6e689b80cfcdd74b0995250d63d76ab789f1315af7fe326122540cddfad2
- [File Hash] – 41c0b2258c632ee122fb52bf2f644c7fb595a5beaec71527e2ebce7183644db2
- [File Hash] – 2e808fc1b2bd960909385575fa9227928ca25c8665d3ce5ad986b03679dace90