General

  • Target

    lockb.7z

  • Size

    132KB

  • MD5

    766c7ccd257739d252646a60e42ed0c0

  • SHA1

    1637e3de37d86ccde517875b991dfec1a093330e

  • SHA256

    87e87fd910037fb102a728f4e0036cf5f066b7b704e1160bd685d71d290acedb

  • SHA512

    c0b86d4425d9955d0c965d943d360c1d61f35d1df0f6819a93630ea15c4df91590dada59a667ffaacf7563943ffb2c4b71e3157fbdeb42937f1a91a77d87d1a4

  • SSDEEP

    3072:rXuH35kCQ/sKLVUhaAt3QRpEC354A2JANtly9t337AamUiXteJkOnK:re2FjaaApKGCp4A2J6t4z7AarEikB

Score
10/10

Malware Config

Signatures

  • Lockbit family
  • Rule to detect Lockbit 3.0 ransomware Windows payload 3 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 4 IoCs

    Checks for missing Authenticode signature.

Files

  • lockb.7z
    .7z

    Password: infected

  • l.exe
    .exe windows:5 windows x86 arch:x86

    Password: infected


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • l1.exe
    .exe windows:5 windows x86 arch:x86

    Password: infected

    914685b69f2ac2ff61b6b0f1883a054d


    Headers

    Imports

    Sections

  • l2.exe
    .exe windows:5 windows x86 arch:x86

    Password: infected

    914685b69f2ac2ff61b6b0f1883a054d


    Headers

    Imports

    Sections