General
-
Target
1f0a89360bb9471af8b2b1136eafd65f
-
Size
250KB
-
Sample
231230-2thvbahfa4
-
MD5
1f0a89360bb9471af8b2b1136eafd65f
-
SHA1
a7bd3592ff31c5c659cda9810936ddce842d6590
-
SHA256
2a23fac4cfa697cc738d633ec00f3fbe93ba22d2498f14dea08983026fdf128a
-
SHA512
c696ee6a3a65cf01f120724c8536d14bbdc5283e6a62e1a26454629ea30c4015d62c1ba6139ca158f9952d6028ea7d9a1f76a4d2adad4e3a377d06607f5ad031
-
SSDEEP
6144:bAr3VCaIjpP65V3Q400RwDym6flM5OPh2r:bAr3VCMP00RwDymd5Uh2r
Behavioral task
behavioral1
Sample
1f0a89360bb9471af8b2b1136eafd65f.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1f0a89360bb9471af8b2b1136eafd65f.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
C:\Users\LOCKFILE-README-GLTGRJAG-1704392475.hta
http-equiv="Content-Type"
http-equiv="x-ua-compatible"
Extracted
C:\Users\Public\LOCKFILE-README.hta
lockfile
https://tox.chat/download.html
http://zqaflhty5hyziovsxgqvj2mrz5e5rs6oqxzb54zolccfnvtn5w2johad.onion
Targets
-
-
Target
1f0a89360bb9471af8b2b1136eafd65f
-
Size
250KB
-
MD5
1f0a89360bb9471af8b2b1136eafd65f
-
SHA1
a7bd3592ff31c5c659cda9810936ddce842d6590
-
SHA256
2a23fac4cfa697cc738d633ec00f3fbe93ba22d2498f14dea08983026fdf128a
-
SHA512
c696ee6a3a65cf01f120724c8536d14bbdc5283e6a62e1a26454629ea30c4015d62c1ba6139ca158f9952d6028ea7d9a1f76a4d2adad4e3a377d06607f5ad031
-
SSDEEP
6144:bAr3VCaIjpP65V3Q400RwDym6flM5OPh2r:bAr3VCMP00RwDymd5Uh2r
Score10/10-
Detect LockFile payload
-
LockFile
LockFile is a new ransomware that emerged in July 2021 with ProxyShell vulnerabilties.
-
Renames multiple (1058) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops file in Drivers directory
-
Deletes itself
-
Drops startup file
-
Drops file in System32 directory
-