Behavioral task
behavioral1
Sample
LBB.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
LBB.exe
Resource
win10v2004-20230915-en
General
-
Target
LBB.exe
-
Size
159KB
-
MD5
b861f30317232a2ddeef5e161039d783
-
SHA1
13f72bba11e1a21f5675345ebfafdca3d09c456f
-
SHA256
56be4f586369879a0a05d9f94261c2e556455547b668d84acf20b0fbb43b8317
-
SHA512
5b85d6b0519ec03a4cab05452ffc66a55f741b06694fb18edf27484e9348e471d255287ea40da6b22c4269d592d45490c938a05a3a86d9fae0ee88ff10bfd68d
-
SSDEEP
3072:YuJ9OlKolUa1U197bzhVsmftsYUIr4b9s0kQSWkibpypn:Yufj0zi1dNVsmftjUIrg9s0kQZEn
Malware Config
Signatures
-
Lockbit family
-
Rule to detect Lockbit 3.0 ransomware Windows payload 1 IoCs
resource yara_rule sample family_lockbit -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource LBB.exe
Files
-
LBB.exe.exe windows:5 windows x86
Password: infected
89b43582b27abefb2b74684ab12a2f8e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
CreateDIBitmap
TextOutW
SetTextColor
SetPixel
GetTextMetricsW
GetTextColor
GetTextCharset
BitBlt
user32
CreateDialogParamW
CreateMenu
DefWindowProcW
EndDialog
GetDlgItem
GetKeyNameTextW
LoadImageW
kernel32
GetModuleHandleW
SetLastError
LoadLibraryW
LoadLibraryExA
FormatMessageW
GetLastError
GetDateFormatW
GetAtomNameW
Sections
.text Size: 95KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itext Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ