General
-
Target
52e1fed4c521294c5de95bba958909c1
-
Size
267KB
-
Sample
240111-h37p9acch7
-
MD5
52e1fed4c521294c5de95bba958909c1
-
SHA1
1d01528de63c9581be0ea5ebc18dff7f6a2272d4
-
SHA256
bf315c9c064b887ee3276e1342d43637d8c0e067260946db45942f39b970d7ce
-
SHA512
fe173025fd8e966965b2bff9389f25f215c05f54fc2283238e279ec0d14d46655c50f2cbf0d655c073de616f77151837efeffd93302230b34278a1b41f5365d6
-
SSDEEP
6144:NARrIk3qCl6TvSWg6ZZaYQ4dlGvgjWrgFnp3z3gj77vi7Cr:NARswU124dl3JFnp3rg3DA
Static task
static1
Behavioral task
behavioral1
Sample
52e1fed4c521294c5de95bba958909c1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
52e1fed4c521294c5de95bba958909c1.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
F:\$RECYCLE.BIN\LOCKFILE-README-CALKHSYM-1704957412.hta
http-equiv="Content-Type"
http-equiv="x-ua-compatible"
Extracted
C:\Users\Public\LOCKFILE-README.hta
lockfile
https://tox.chat/download.html
http://zqaflhty5hyziovsxgqvj2mrz5e5rs6oqxzb54zolccfnvtn5w2johad.onion
Targets
-
-
Target
52e1fed4c521294c5de95bba958909c1
-
Size
267KB
-
MD5
52e1fed4c521294c5de95bba958909c1
-
SHA1
1d01528de63c9581be0ea5ebc18dff7f6a2272d4
-
SHA256
bf315c9c064b887ee3276e1342d43637d8c0e067260946db45942f39b970d7ce
-
SHA512
fe173025fd8e966965b2bff9389f25f215c05f54fc2283238e279ec0d14d46655c50f2cbf0d655c073de616f77151837efeffd93302230b34278a1b41f5365d6
-
SSDEEP
6144:NARrIk3qCl6TvSWg6ZZaYQ4dlGvgjWrgFnp3z3gj77vi7Cr:NARswU124dl3JFnp3rg3DA
Score10/10-
Detect LockFile payload
-
LockFile
LockFile is a new ransomware that emerged in July 2021 with ProxyShell vulnerabilties.
-
Renames multiple (1096) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops file in Drivers directory
-
Deletes itself
-
Drops startup file
-
Drops file in System32 directory
-