General
-
Target
b7147a76c6695b750a84de55d4569f71f694b33aeefeef5daa09318ebabd9a24
-
Size
35.6MB
-
Sample
240414-mwat6aga64
-
MD5
78dfa08cce661350941f9cbaa04321c3
-
SHA1
6f5e0fac7d3506e8e88750d903624dd2c64f7d01
-
SHA256
b7147a76c6695b750a84de55d4569f71f694b33aeefeef5daa09318ebabd9a24
-
SHA512
4de7f03542fc6536232515b1dcbf27bfa2754128dfd6ec816bb6892053e08db92dbaaa66e56325719df5d27fafd0df7f0b533a6df9bc307e8d07826ae9512ea6
-
SSDEEP
786432:o+qNWPQWNdMvh2f0tAcGRTh3YeI0+r3zZO4s:o+qNWPZKvh40tAcGRTh380+r3zk4s
Behavioral task
behavioral1
Sample
b7147a76c6695b750a84de55d4569f71f694b33aeefeef5daa09318ebabd9a24.zip
Resource
win10-20240404-en
Malware Config
Extracted
blackmatter
25.239
Extracted
blackmatter
65.239
Extracted
C:\Program Files\Java\jdk-1.8\include\Restore-My-Files.txt
lockbit
http://lockbitks2tvnmwk.onion/?A51C1D5E9695AD10A0FA64FBBC21460C
Targets
-
-
Target
b7147a76c6695b750a84de55d4569f71f694b33aeefeef5daa09318ebabd9a24
-
Size
35.6MB
-
MD5
78dfa08cce661350941f9cbaa04321c3
-
SHA1
6f5e0fac7d3506e8e88750d903624dd2c64f7d01
-
SHA256
b7147a76c6695b750a84de55d4569f71f694b33aeefeef5daa09318ebabd9a24
-
SHA512
4de7f03542fc6536232515b1dcbf27bfa2754128dfd6ec816bb6892053e08db92dbaaa66e56325719df5d27fafd0df7f0b533a6df9bc307e8d07826ae9512ea6
-
SSDEEP
786432:o+qNWPQWNdMvh2f0tAcGRTh3YeI0+r3zZO4s:o+qNWPZKvh40tAcGRTh380+r3zk4s
Score10/10-
Rule to detect Lockbit 3.0 ransomware Windows payload
-
Modifies boot configuration data using bcdedit
-
Renames multiple (6385) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-