General
-
Target
430492f325292bb007cf8913eed4d042ecabad89aabafd34d3be375016e7795a
-
Size
1.1MB
-
Sample
240531-ppbh8agh71
-
MD5
bb3f13a877b7bce490965d5be1abbeb3
-
SHA1
f4068d17e85a99a869c99d36c6214c34a1c067d9
-
SHA256
430492f325292bb007cf8913eed4d042ecabad89aabafd34d3be375016e7795a
-
SHA512
53d6c98cf387dd73a844cf853aa1b5b1b4ab0934e3da2f5e1d6eb55b4173299a885e7ba295a16930b2bef8747f086f45991334a65b5a2455fbc12ca5b95effc1
-
SSDEEP
24576:GU2Nmt559j0wK0LnOsPSC34+iMxdzjFA6af6FKRR:GUB55apKD7vrxNaB
Static task
static1
Behavioral task
behavioral1
Sample
430492f325292bb007cf8913eed4d042ecabad89aabafd34d3be375016e7795a.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
430492f325292bb007cf8913eed4d042ecabad89aabafd34d3be375016e7795a.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
C:\Program Files\Java\jdk1.7.0_80\db\lib\Restore-My-Files.txt
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion
https://bigblog.at
http://lockbitsup4yezcd5enk5unncx3zcy7kw6wllyqmiyhvanjj352jayid.onion
http://lockbitsap2oaqhcun3syvbqt6n5nzt7fqosc6jdlmsfleu3ka4k2did.onion
https://decoding.at
Extracted
C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\Restore-My-Files.txt
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion
https://bigblog.at
http://lockbitsup4yezcd5enk5unncx3zcy7kw6wllyqmiyhvanjj352jayid.onion
http://lockbitsap2oaqhcun3syvbqt6n5nzt7fqosc6jdlmsfleu3ka4k2did.onion
https://decoding.at
Extracted
C:\Users\Admin\Desktop\LockBit_Ransomware.hta
https://decoding.at/
http://lockbitsap2oaqhcun3syvbqt6n5nzt7fqosc6jdlmsfleu3ka4k2did.onion/or
https://decoding.at
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion
https://bigblog.at
Targets
-
-
Target
430492f325292bb007cf8913eed4d042ecabad89aabafd34d3be375016e7795a
-
Size
1.1MB
-
MD5
bb3f13a877b7bce490965d5be1abbeb3
-
SHA1
f4068d17e85a99a869c99d36c6214c34a1c067d9
-
SHA256
430492f325292bb007cf8913eed4d042ecabad89aabafd34d3be375016e7795a
-
SHA512
53d6c98cf387dd73a844cf853aa1b5b1b4ab0934e3da2f5e1d6eb55b4173299a885e7ba295a16930b2bef8747f086f45991334a65b5a2455fbc12ca5b95effc1
-
SSDEEP
24576:GU2Nmt559j0wK0LnOsPSC34+iMxdzjFA6af6FKRR:GUB55apKD7vrxNaB
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-