Introduction
BlackSuit has been one of the most advanced and prolific Russian-speaking
ransomware groups for almost a decade (since the time they were named
Team-2 within Ryuk ransomware). However, these days the groups are going
through a painful transition marked by the internal struggle between
the locker developer and the group’s admin.
This struggle, which has already impacted companies with incidents
such as their 2024 attacks against CDK Global, Kadokawa, and Niconico,
originated during the complex process of the Royal-to-BlackSuit rebrand.
This journey could be characterized as a constant choice between
encryption and exfiltration. In this research, RedSense relies on the
adversarial perspective (i.e. the intelligence harvested from within
adversarial infrastructure, both social and technical) to explain how the
rebrand was shaped but also altered the larger Royal/BlackSuit history,
and what critical characteristics of this group were revealed in this
transition.
The first part of this research follows Royal’s journey (October 2022
to October 2023), examining how this rebrand (October 2023 to October
2024) both follows and reinvents its operational legacy, shaping the
trajectory of its future campaigns.
The second half follows the tools that characterized this rebrand: Over
the past year, RedSense was able to recover samples of 10+ unique tools
that are a mix of never-before-seen malware, off-the-shell “goodware”
tools, commodity RATs, and an exclusive look at a new hand-built Command
and Control (C2) framework that is in active use and development by the
BlackSuit team to exploit and pivot in victim environments.
Royal’s Journey
2022-2025
Formerly known as Conti-2 (as well as ‘Quantum’ for a short period
following Conti’s dissolution) BlackSuit has risen to become one of
the largest and arguably most prolific active Russian-speaking ransomware
groups. Known for major attacks on Costa Rica and the City of Dallas—and
for triggering Conti’s dissolution by openly siding with Russia—Royal
built its reputation through a unique approach: centralized command with
decentralized operations, adopting the best of Conti’s structure.
Structurally, Royal built a “locker alliance,” deploying a lineup
of ransomware variants: BlackCat, LockBit, Quantum Locker (sourced from
Mount Locker/Dagon), HIVE, Akira, and others. Their reach has since
stretched beyond ransomware, as they monopolized Emotet and Anubis and
established Royal’s Malware Lab—a workspace for cross-group collective
malware development.
By 2023, Royal’s operations included a crew of 50 “pentesters”
and a dedicated pre-attack team, harnessing call centers to reinforce
BazarCall and constantly gathering intel through LinkedIn and insights
into U.S. businesses for supply-chain infiltration. However, in October
2023, Royal executed a strategic rebrand, reemerging as BlackSuit—a
shift that restructured their TTPs and arsenal (with a detailed analysis
on this later in the report).
Prioritizing Exfiltration
October 2022 - March 2023
At the end of 2022, Royal had a firm reliance on botnets and legacy
malware, essentially monopolizing Emotet by allegedly purchasing
exclusive use of its source code and by deploying Anubis malware
for its payload delivery.
Developing custom stealer tools—a theme that would continue to persist
for the group—Royal partnered with elite Initial Access Brokers
(IABs) in order to gain Citrix credential accesses and began to create
an automated pipeline to streamline case handling. As the primary group
exploiting critical vulnerabilities for Apache Log4j, Royal continued
its CVE research, deploying novel ProxyNotShell and MOVEit
zero-day vulnerabilities (which were also highly associated with Cl0p)
to establish high-impact access points in corporate systems.
While encryption remained essential, Royal prioritized exfiltration. The
group employed various families like BlackCat, LockBit, and HIVE
as its associates to maximize damage to its victims’ public image by
posting on these groups’ blogs. LockBit in particular amplified victim
damages through public exposure tactics, with Royal posting massive blog
posts for them and LockBit utilizing constant social media exposure and
communication with journalists and security researchers to intensify
the impact against victims.
Even their in-house locker tools, such as the Royal locker (based on
the original Conti locker) and allies’ malware like Quantum and
Dagon (MountLocker line) served primarily as damage enhancers
rather than primary components. Exfiltration, bolstered by targeted
social engineering, was the real core of their strategy.
For this top priority, social engineering was integral to Royal’s
operations, and the group would leverage publicly available LinkedIn
data to pinpoint high-value targets and craft personalized schemes
to target victims’ security and IT personnel. Their expansive call
center and spam networks enabled the group to execute large-scale
callback phishing attacks (aka BazaarCall), which involved Royal
operators posing as legitimate services to trick victims into downloading
malware. This blend of ransomware, botnets, and social engineering created
a highly coordinated attack approach that defined Royal’s activities
from late 2022 to early 2023.
Keeping a “Social” Focus
January-March 2023
In early 2023, Royal ransomware executed three impactful social
engineering campaigns which targeted a number of valuable sectors.
In February 2023, they used black SEO tactics to manipulate search
engine results aimed at redirecting users searching for tech companies to
a set of fake websites. This site prompted its visitors to download
malware with the aid of a sophisticated chatbot, while Royal’s
partnership with a black SEO team bolstered their spam campaigns with
extensive third-party data.
A similar campaign was political and impersonated a fictitious political
group supporting a well-known candidate.
In March 2023, Royal intensified its phishing efforts by impersonating
a fictional threat group (“Midnight”) to exploit high-profile
U.S. companies. Victims were baited with a fake breach notice urging
them to download a secretly malicious file ("listing[.]rar”) which
allegedly contained a listing of files taken from their system. Through
a 500,000 email database, Royal’s centralized server managed responses
to these emails to use for future operations in order to maintain attack
continuity. This campaign also introduced Royal’s “TrickBot-2”
loader, a Qbot alternative designed with advanced AV evasion, stealth,
and Cobalt Strike integration for streamlined malware deployment.
May 2023: From New Loader to New Locker
On May 1, 2023, RedSense identified a new locker associated with the Royal’s backend called Blacksuit. This locker was developed by the original creators of the Royal locker (from the Ryuk-Conti-Royal lineage, not the AstraLocker-MountLocker-Quantum-Dagon line). This locker was first tested in a small-scale attack on a New Jersey municipality.
A group internal update introduced the Blacksuit locker on May 1, followed by the the introduction of the Gazavat stealer/CMD botnet on May 2. A new malware loader, replacing .dll formats with .pdf and .doc files for more authentic phishing campaigns, was also tested during this period.
Image highlighting the affected radius for the city of Dallas, as well
as featuring a copy of Royal’s ransom note for the attack, via the
media outlet. [Raw Alerts]
It is highly likely that Royal’s leadership decided to rebrand as BlackSuit on May 1 intentionally, aiming to make their attack on Dallas as attention-grabbing as Conti-2’s attack on Costa Rica in June 2022 (This earlier attack, led by the same Team 2 actors, served as a “finale” for Conti before its dissolution). At the same time, HUMINT suggests it was designed to assist the transition of Conti-2 into Quantum—Royal’s predecessor.
The unusual tactics associated with this attack combined with Royal’s timely structural updates led RedSense to assess with moderate-to-high confidence that the Dallas attack was a deliberate “stunt” designed to boost media visibility and introduce their new TTPs ahead of the group’s rebrand into BlackSuit.
Refocusing on Encryption
June 2023-October 2023
The transition to BlackSuit (still unofficial at the time) marked a significant shift in Royal’s tactics, moving toward a more traditional encryption-oriented approach. This was a departure from their focus earlier in 2023, where Royal still prioritized exfiltration.
Royal’s shifts between the encryption and exfiltration focus are closely tied to its origins in the Conti syndicate. Conti as a group began by adding a public shame blog to Ryuk. This was a controversial decision at the time, as early Ryuk operatives (who later formed groups like Zeon, Akira, and Play) preferred sticking to encryption-only attacks. However, the group admin (who would later lead Conti2/Royal) advocated for a novel, more exfiltration-centric approach with the introduction of Conti’s leak blog, which became highly successful.
This same admin, however, later used the blog to promote political agendas supporting Russia, which was a significant factor leading to Conti’s dissolution. The fallout left many ex-Conti operatives skeptical of the blog-centric model, favoring encryption as their primary tactic.
While Royal leaned on exfiltration and maintained a blog, other Conti offshoots, like Conti-4 and Conti-5, focused on the Asian and LATAM (Latin American) darkweb markets, while groups like Zeon and Silent Ransom prioritized encryption. Royal’s competitor, BlackBasta (Conti-3), struck a balance by maintaining a prolific active blog while still heavily focusing on encryption and operating a separate exfiltration-only arm, Karakurt. By Spring 2023, Royal began navigating the ongoing shifts in the locker ecosystem, refocusing from exfiltration and social engineering toward a more balanced strategy.
The development of BlackSuit reflected this shift.
By mid-2023, Royal initiated a bid for a new locker in the form of a competition, with contributions from Akira as well as former Ryuk developers. While the precise origin of BlackSuit remains unclear, it was selected after testing and became central to Royal’s strategy. Alongside BlackSuit’s introduction, Royal recruited an elite group of former REvil pentesters who were known for their high-profile breaches to enhance their encryption capabilities. This internal pivot signaled a return to encryption as a core tactic while maintaining exfiltration as a supplementary pressure strategy.
Simultaneously, Royal began working on new delivery tools for the new locker. On July 19, 2023, RedSense confirmed that Royal had armed its loader for the next phase of testing. This update involved the distribution of 300,000 spam emails containing the active Cobalt Strike DLL payload.
By August, Royal had advanced and updated its malware loader, now called Trick3, specifically for this campaign. Trick3 leveraged the use of ActiveX objects, which were hidden as an Adobe Acrobat update prompt on a PDF invoice which was sent to victims. Clicking these ActiveX objects would execute the loader to deliver Royal’s malware payloads. Finally, by October 2023, Royal finally completed its rebrand and became BlackSuit.
As seen above, this transition was not just a simple rebrand, but a long-calculated strategic move. The most important thing, however, was that the group began prioritizing encryption over exfiltration again, and this resulted in more power held by the locker developer. This itself lead to the crisis of command between BlackSuit’s admin and the locker developer which is incremental to the current group’s tactics.
By Landon Rice with contributions from Marley Smith
|
- NAME: icsnd1.exe
- TYPE: PROPRIETARY MALWARE
- DEFENDER DETECTED: YES
- VT DETECTED: YES
-
SUMMARY: A malicious loader which has been extensively advertised on the darkweb, namely RAMP and XSS forums, by the threat actor “DarkBLUP”.
|
As of 2024 BlackSuit was aiming to recreate the Emotet-TrickBot-Ryuk killchain by implementing a combination of AresLoader-Lumma-BlackSuit.
BlackSuit and Royal leadership saw AresLoader as an alternative to Emotet. This is a relatively simplistic loader which has been in use since early 2022, and originally sold licenses to threat actors using a monthly subscription model for 300 USD per month.
NOTE: The loaders should not be confused with the open-source loader “Project Ares”, which written by redteamer “cerbersec” as a PoC (Proof-of-Concept) which implemented the Transacted Hollowing Injection technique.
Ares Loader’s sole functionality is calling down a file from the internet and running it while attempting to masquerade as a legitimate binary. Loaders like these are very common on the darkweb, giving cybercriminals an easy way to prevent detection of their commodity and often open-source malware/stealers. The loader implements some basic anti-analysis techniques, but ultimately does not stand out within BlackSuit’s extensive toolkit.
|
- NAME: MED.exe
- TYPE: ILLICIT COMMERCIAL STEALER
- DEFENDER DETECTED: NO
- VT DETECTED: YES
-
SUMMARY: Lumma Stealer (aka LummaC2 Stealer) is an infostealer written in C that has been available through a Malware-as-a-Service model via Russian-speaking forums since around August 2022.
|
As of 2024 BlackSuit was aiming to recreate the Emotet-TrickBot-Ryuk killchain by implementing a combination of AresLoader-Lumma-BlackSuit.
RedSense analysts discovered a LummaC2 payload among BlackSuit’s original arsenal introduced on their internal assets in May 2023. This is a highly advanced infostealer that is in active development today, and is a favorite tool of many cybercriminals. This stealer has an incredibly active Telegram and darknet presence, and is run by the threat actor “Shamel” under the alias “Lumma”, which the product is named after.
The stealer has a strong emphasis on stealing two-factor authentication codes and cryptocurrency wallets from a wide range of extensions across a wide range of browsers. Once it gathers all of the data off the victim machine, it POSTs the data (over raw HTTP) to its C2 server with the “TeslaBrowser/5.5” user agent.
RedSense has seen a wide range of stealers in use across a wide range of ransomware gangs, but this specific combination of BlackSuit and Lumma has not been publicly disclosed or widely analyzed.
This subscription-based infostealer implements a wide range of available payloads, including EXEs, DLLs, PowerShell Scripts, and is often deployed via a loader, either provided by the Lumma developer(s), or custom written. The heart of the stealer is quite evasive, and is some of the highest-tier malware that is publicly available.
The tool implements its own form of API Hashing
, and uses Anti-Sandboxing/Anti-Debug checks
, Control Flow Obfuscation
, Heaven’s Gate Technique
, (In)direct syscalls
, and a long list of other evasion techniques that are consistently updated and changed based on detections. The malware author(s) verify and check each release against Windows Defender, and ensure it is not detected at the time of release. Even with all of these techniques, Lumma highly recommends using a crypter/loader upon execution, to minimize the chances of detection, and getting leaked.
NOTE: After RedLine takedown, Lumma is considered the number one priority stealer among the Russian-speaking ransomware leadership.
TOOL #3- CUSTOM C2
|
- NAME: fuckallav.ru
- TYPE: PROPRIETARY MALWARE
- DEFENDER DETECTED: NO
- VT DETECTED: NO
-
SUMMARY: A developmental C2 by BlackSuit’s team, allowing for SOCKS, keylogging, screen recording, command execution, and custom sleep time.
|
During analysis, RedSense analysts discovered evidence of a custom Command and Control framework that was in a developmental stage by BlackSuit’s Malware Development team. Very few Threat Actors put in the time and energy to develop their own custom C2 framework, and this speaks to BlackSuit’s sophistication and investment in their craft.
The C2 panel contains the following functionality:
- Bots- The home page of the C2, showcasing all of the victims, along with their unique bot ID, IP address, and comments.
- Files- Allows the operator to view saved/exfiltrated files from the victim’s machine.
- Send Commands- Contains a list of active victims and a text input box to run custom commands on selected victims.
- Send Comment- Not shown, but we can assume it allows operators to add custom “notes” or tags to a victim.
- Keylogs- Not shown, but we can assume it allows the operator to view exfiltrated keystrokes for each victim.
- Admins- Not shown. Likely supports multi-user capabilities for the panel.
- Switch the language to ru- Self explanatory. Hints that the original developer may be of Russian origin.
- Mail spam- Mail spamming feature, allowing operators to send emails/phishes from the panel.
- Exit- Closes the tab for the C2.
For the malware itself, RedSense discovered the following commands/capabilities:
- !On/Off- Activation/deactivation of the malware
- !CMD - execution of the command in Windows CMD
- !Time - Changing the sleep time of the bot
- !Getdir - Get directory listing of the system
- !SCR - turning on the mode of sending the screen broadcast using periodic screenshots
- !SOCKS - Configuring/installing SOCKS proxies
- !@Url - Downloading, and unpacking the file if it’s a .zip. Then proceeds with execution, if it is an executable file, or registration in the system, if it is a DLL.
- !KLG - Activation or deactivation of the keylogging function.
TOOL #4- ZENPAK MALWARE
|
- NAME: AIinstaller.exe
- TYPE: UNATTRIBUTED BACKDOOR
- DEFENDER DETECTED: NO
- VT DETECTED: YES
-
SUMMARY: This piece of malware does not match any signatures of known malicious software.
|
AIinstaller.exe (identified within the adversarial infra) does not match any 1:1 signatures for known viruses, though it does have multiple malicious functionalities which were discovered by RedSense. VirusTotal, among other engines, give it conflicting attribution names, including TrickBot, Sefnit, Artemis, and Waledac, although the most common attribution for this file is “Zenpak”. “Zenpak”’s functionality includes:
AIinstaller.exe
- Contains self-spreading and self-replication capabilities.
- Contacts domain “ip-api[.]com” to grab victim’s IP address.
- Accesses and manipulates PEB_LDR_DATA data structure for evasion.
- Implements multiple forms of anti-sandbox and anti-debug technology.
- Encodes and Decodes data with XOR.
- Logs keystrokes via application hooks and polling.
- Manipulates Powershell-related registry keys.
TOOL #5- COBALT STRIKE (LICENSED COPY)
|
- NAME: Cobalt Strike v.4.6
- TYPE: COMMERCIAL PENTEST TOOLING
- DEFENDER DETECTED: YES
- VT DETECTED: YES
-
SUMMARY: Cobalt Strike is a powerful, extensible penetration testing platform that provides security analysts with an interactive analysis workspace and a variety of tools for attack simulation, exploitation, post-exploitation, and report generation.
|
RedSense’s analysts discovered multiple compiled Cobalt Strike beacons alongside the original BlackSuit infrastructure (introduced in May 2023). It contained a legitimate, licensed copy of the Cobalt Strike framework. (NOTE: While seeing threat actors using Cobalt Strike is common, it is very rare to stumble across a group utilizing a genuine copy of the software. The majority of lower-tier actors share leaked and/or cracked copies.)
This speaks to BlackSuit’s high level of sophistication in their ability to gain access to an up-to-date and recent version of the software, as opposed to older (and backdoored) copies that are generally shared around the darkweb. This copy was seen to be using the following arsenal kits:
Applet Kit: Allows operators to modify Cobalt Strike’s built-in Java Applet payloads. This kit was the first to be added to Arsenal and is no longer widely used.
Artifact Kit: Allows operators to modify the templates for all Cobalt Strike executables, DLLs, and shellcode.
Mimikatz Kit: Allows operators to update their version of Mimikatz without waiting for a Cobalt Strike software update. Mimikatz is a very popular tool used to dump credentials on Windows machines.
Power Applet Kit: This is an alternate implementation of Cobalt Strike’s Java Applet attack that uses PowerShell to get a payload into memory.
Resource Kit: The Resource Kit is Cobalt Strike’s means to change the HTA, PowerShell, Python, VBA, and VBS script templates Cobalt Strike uses in its workflows.
Sleep Mask Kit: The Sleep Mask Kit contains options for the sleep mask function that is executed to obfuscate Beacon in memory, prior to sleeping.
Reflective Loader Kit: This allows operators to customize the reflective loader functionality used by the core beacon, allowing for operators to implement new evasion techniques.
Redacted screenshot of BlackSuit’s Cobalt Strike control panel [source: RedSense]
TOOL #6- PROXIFIER
|
- NAME: proxifier.lnk
- TYPE: GOODWARE
- DEFENDER DETECTED: NO
- VT DETECTED: NO
-
SUMMARY: Proxifier is a program that allows network applications that do not support proxy servers to operate through a SOCKS/HTTPS proxy or a chain of proxy servers.
|
Proxifier
is a tool that can be used to tunnel all network connections through a proxy, making it an attractive option for threat actors looking to pivot deeper into an environment. By turning a victim machine into a proxy and routing all of their traffic through it, actors can access deeper and segmented parts of a network to continue their attack. This can make it very difficult to identify and stop cybercriminals before they cause significant harm. Proxifier allows threat actor to:
- Run any network applications through a proxy server (No special configuration is required for the software).
- Access the Internet from a restricted network through a proxy server gateway.
- Bypass firewall restrictions.
- “Tunnel” the entire system (force all network connections including system connections to work through a proxy server).
- Resolve DNS names through a proxy server.
- View information on current network activities (connections, hosts, times, bandwidth usage, etc.) in real-time.
- Maintain log files and traffic dumps.
- Get detailed reports on network errors.
TOOL #7- SOFTPERFECT NETWORK SCANNER
|
- NAME: netscanold.exe
- TYPE: GOODWARE
- DEFENDER DETECTED: NO
- VT DETECTED: NO
-
SUMMARY: Powerful multipurpose network administration tool, with the ability to scan both the IPv4 and IPv6 network space.
|
The SoftPerfect Network Scanner
is a closed source network scanning tool. SoftPerfect Network Scanner can ping computers, scan ports, discover shared folders and retrieve information about network devices via WMI, SNMP, HTTP, and SSH. It also scans for remote services, registry, files and performance counters, and offers flexible filtering and display options with the capability to export NetScan results to a variety of formats from XML to JSON.
This sample was configured with the following data:
Scan of TCP Ports: 445, 1433, 2179, 3389, 6160, 5000, 5001, 6101, 9392, 9393, 9443, and 9401
Get Banners from Ports: 21, 80, 443, 3128, 8080, and 16992
Scans of the following IP ranges:
- 10.10.0.0/16
- 10.20.0.0/16
- 10.30.0.0/16
- 10.40.0.0/16
- 10.50.0.0/16
- 10.211.0.0/16
TOOL #8- PCHUNTER
|
- NAME: PCHunter64.exe
- TYPE: GREYWARE
- DEFENDER DETECTED: NO
- VT DETECTED: YES
-
SUMMARY: Toolkit with access to hundreds of settings including kernels and kernel modules, processes, network, startup and more.
|
PCHunter
is a powerful tool designed to give users broad access and control over Windows operating systems. Hackers can use PCHunter to control critical system components. With the ability to manipulate kernel structures and interfere with system processes, malicious actors can use PCHunter to abuse the lowest level of access to deal damage to a victim PC. Some of the tool’s capabilities include:
Process Viewer: Can be used to view sensitive information such as passwords, credentials or personal data stored in memory and steal it.
Kernel Module Viewer: Can be used to load and unload kernel modules, as well as view their memory.
Hook Detector: Can be used to hook view hooked system calls, allowing an attacker to detect anti-virus software.
System Callback Viewer: Can be used to view kernel callbacks, shutdown events or file system notifications.
Network Viewer: Can be used to view sensitive network traffic or intercept data being transmitted over the network for malicious purposes such as stealing credentials or personal information.
Registry Viewer: Can be used to modify system settings, delete important registry keys or install persistence onto a victim host.
TOOL #9- RUBEUS
|
- NAME: rubeus.exe
- TYPE: OPEN-SOURCE PENTEST TOOL
- DEFENDER DETECTED: YES
- VT DETECTED: YES
-
SUMMARY: Rubeus is a C# toolset for raw Kerberos interaction and abuses.
|
Rubeus
is a C# executable and library built to interact with the Windows AD Kerberos protocol. This software, built by security researcher Will Schroeder
, is a common method for threat actors to use and abuse Kerberos across Windows environments.
Similar to mimikatz
, Rubeus includes a long list of commands to interact with Kerberos tickets. This includes creating, forging, bypassing, requesting, retrieving, managing, harvesting, roasting, extracting, and otherwise manipulating them. It is not uncommon for threat actors to use Rubeus to leverage these capabilities, as it is a useful tool for exploiting Active Directory environments.
TOOL #10- DOMINO (MINODO)
|
- NAME: x64.exe
- TYPE: PROPRIETARY MALWARE
- DEFENDER DETECTED: YES
- VT DETECTED: YES
-
SUMMARY: Domino, also referred to as Minodo, is a custom backdoor developed by Fin7 and Ex-Conti actors.
|
This strain of malware, Domino, has been extensively analyzed by IBM’s X-FORCE team. This backdoor registers itself with a Command and Control server, encrypts communications with AES, and allows operators to load additional tools, namely the Nemesis Infostealer and Cobalt Strike.
Domino/Minodo first discovered in early 2023, and has been seen multiple times since, often being deployed by Royal, BlackBasta, and other ex-Conti ransomware groups. This hints at the fact that one/many of the core developers may be working with BlackSuit.
MISCELLANEOUS TOOLS
IOCs
All relevant IoCs are included in RedSense’s IoC database for service subscribers.
Hashes |
8f9760226b17030371fad2539a98ce7a
955ecf3cd5b8562dd610b2daac413e99
bd61059259bf5208509d15726ce5dfab
300bd29c8639ebe794d2dd449d49fdca
3069012ec13cf5043829dfdcc52be0c2
bf843074cb5e61ca955ba3c30019c24b
82d0eddf99ab5f8dea209d756ba13c4a
2cc79806701f1a6e877c29b93f06f1bb
171d8bdb16f062f3a84310b37622a4d3
1e819c99570a76695cdbd66b8e49d432
75f3b2d0dac980275b94b1dbbf080d52
be0e1b863340b5d3f980b614a7118b11
f40646272ff1f8f5e8d7021276d78841
5f8bea9e93432e5eaf7df2ccf7c7a7ac
6798ff540f3d077c3cda2f5a4a8559f7
b2fcaffce69d5a32de53db54ed5c3a7c
|
IPs |
79[.]132.129.137
88[.]119.175.124
79[.]141.162.131
85[.]239.54.214
|
Emails/Personas |
|