General
-
Target
eVZbWhFl.ps1
-
Size
220KB
-
Sample
230801-cd5lpsce42
-
MD5
f312dd218a7a6e5ccb480c3435f35692
-
SHA1
33390cb7941a2a06ef563ac3d715afa64083e3fc
-
SHA256
d002302a8e120ce7e4ec31a84c1e630e6a95bc0845552d956022f9e179a3509e
-
SHA512
fc006bb211127552fafeb0248113d9426180809a18e31cd9b34a83ff429f11b59743166c778592ead1e141cad92873a6a525257fab1e57dbce338468df6cc56e
-
SSDEEP
6144:Y3jQazsl9Orcxx81kcLI8bBYivQmFH4d1l:yjpwkeLcLI8dYHmFHi1l
Static task
static1
Malware Config
Extracted
C:\fg1nrax2U.README.txt
lockbit
https://twitter.com/hashtag/lockbit?f=live
https://tox.chat/download.html
Targets
-
-
Target
eVZbWhFl.ps1
-
Size
220KB
-
MD5
f312dd218a7a6e5ccb480c3435f35692
-
SHA1
33390cb7941a2a06ef563ac3d715afa64083e3fc
-
SHA256
d002302a8e120ce7e4ec31a84c1e630e6a95bc0845552d956022f9e179a3509e
-
SHA512
fc006bb211127552fafeb0248113d9426180809a18e31cd9b34a83ff429f11b59743166c778592ead1e141cad92873a6a525257fab1e57dbce338468df6cc56e
-
SSDEEP
6144:Y3jQazsl9Orcxx81kcLI8bBYivQmFH4d1l:yjpwkeLcLI8dYHmFHi1l
-
Modifies security service
-
Rule to detect Lockbit 3.0 ransomware Windows payload
-
Renames multiple (626) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Modifies Windows Firewall
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Process spawned suspicious child process
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
3Windows Service
3