General

  • Target

    96ab95bb6b40006f99267a3ff3a36e24

  • Size

    293KB

  • Sample

    230424-hlh1kabh8x

  • MD5

    96ab95bb6b40006f99267a3ff3a36e24

  • SHA1

    6390f6cfe657437cd2197fdf74faa12831585712

  • SHA256

    0a3eeed311bb2f1745fbc03d851a75a9e4bb922ad3309d2f286dceaa9c4083b4

  • SHA512

    9c10b46a5f3298250abfd3358c9bb5efaceaadf7c65d21562885b92113156f78bc6253eb762cb3eef9b53499ce3f15df577741507ed2b36f9d0953f1fe7362a3

  • SSDEEP

    6144:TUByrr+oyzro4UDrvXiMegziJlymOjRUwDc4FnCkf8m5Ub56s:TUBgyoyvf4ZziHZ3wD4kkoUUs

Malware Config

Targets

    • Target

      96ab95bb6b40006f99267a3ff3a36e24

    • Size

      293KB

    • MD5

      96ab95bb6b40006f99267a3ff3a36e24

    • SHA1

      6390f6cfe657437cd2197fdf74faa12831585712

    • SHA256

      0a3eeed311bb2f1745fbc03d851a75a9e4bb922ad3309d2f286dceaa9c4083b4

    • SHA512

      9c10b46a5f3298250abfd3358c9bb5efaceaadf7c65d21562885b92113156f78bc6253eb762cb3eef9b53499ce3f15df577741507ed2b36f9d0953f1fe7362a3

    • SSDEEP

      6144:TUByrr+oyzro4UDrvXiMegziJlymOjRUwDc4FnCkf8m5Ub56s:TUBgyoyvf4ZziHZ3wD4kkoUUs

    • Lockbit

      Ransomware family with multiple variants released since late 2019.

    • Rule to detect Lockbit 3.0 ransomware Windows payload

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks