General
-
Target
bbdf95831d8fff14ce1341b41f8540841137fb05aa1443a1a68966ab1cdfe0f0
-
Size
483KB
-
Sample
240531-khwhlace9t
-
MD5
59c3704795eeb6aed7b31cd2be1ba4a9
-
SHA1
dbb44d900dee0b00ed2f4f5c472d700811ba3e00
-
SHA256
bbdf95831d8fff14ce1341b41f8540841137fb05aa1443a1a68966ab1cdfe0f0
-
SHA512
1043b98837ed8c6392e9a438ee0cb81461f1cd3a30532c804bd281cdd133dfe7d0291fe5cc1de5b885c76985c499bd28f02a443c9e6a0945574904f145f013fb
-
SSDEEP
12288:oCy1uEgiPripqTLYwnGmp3LSrqQmv295hyd58aVe8JauMI:yuEgiriuY2GyLSrFWc5hkTVladI
Static task
static1
Behavioral task
behavioral1
Sample
bbdf95831d8fff14ce1341b41f8540841137fb05aa1443a1a68966ab1cdfe0f0.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
bbdf95831d8fff14ce1341b41f8540841137fb05aa1443a1a68966ab1cdfe0f0.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
C:\Program Files\Java\jdk1.7.0_80\db\Restore-My-Files.txt
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion
https://bigblog.at
http://lockbitsup4yezcd5enk5unncx3zcy7kw6wllyqmiyhvanjj352jayid.onion
http://lockbitsap2oaqhcun3syvbqt6n5nzt7fqosc6jdlmsfleu3ka4k2did.onion
https://decoding.at
Extracted
C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\Restore-My-Files.txt
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion
https://bigblog.at
http://lockbitsup4yezcd5enk5unncx3zcy7kw6wllyqmiyhvanjj352jayid.onion
http://lockbitsap2oaqhcun3syvbqt6n5nzt7fqosc6jdlmsfleu3ka4k2did.onion
https://decoding.at
Extracted
C:\Users\Admin\Desktop\LockBit_Ransomware.hta
https://decoding.at/
http://lockbitsap2oaqhcun3syvbqt6n5nzt7fqosc6jdlmsfleu3ka4k2did.onion/or
https://decoding.at
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion
https://bigblog.at
Targets
-
-
Target
bbdf95831d8fff14ce1341b41f8540841137fb05aa1443a1a68966ab1cdfe0f0
-
Size
483KB
-
MD5
59c3704795eeb6aed7b31cd2be1ba4a9
-
SHA1
dbb44d900dee0b00ed2f4f5c472d700811ba3e00
-
SHA256
bbdf95831d8fff14ce1341b41f8540841137fb05aa1443a1a68966ab1cdfe0f0
-
SHA512
1043b98837ed8c6392e9a438ee0cb81461f1cd3a30532c804bd281cdd133dfe7d0291fe5cc1de5b885c76985c499bd28f02a443c9e6a0945574904f145f013fb
-
SSDEEP
12288:oCy1uEgiPripqTLYwnGmp3LSrqQmv295hyd58aVe8JauMI:yuEgiriuY2GyLSrFWc5hkTVladI
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-