General
-
Target
ff76ba016e70524e9c5016e0bd55ec7f57ebe654dbe3f9fc438cad9be9e63560.rar
-
Size
281KB
-
Sample
240904-py3zts1gqa
-
MD5
c36beb946f186f7fc542697da6c705bf
-
SHA1
2e00f1ca70fe97e95ca4bd9d1cee674533123653
-
SHA256
ff76ba016e70524e9c5016e0bd55ec7f57ebe654dbe3f9fc438cad9be9e63560
-
SHA512
5a2bd1335955e8b1b84c97ea39b4274a3405499c1d76bec1459628787995df86dbc3d3ed60dcf07d0618eed3b1523bf53b647605a71bcba5e06d90d9547a1577
-
SSDEEP
6144:fQJCr0LvrmHyQuQTOyiNzzSrNTaIiaR0Xv4/WIHudPq14VBa:fQ0+vyHs8ipzSr9cGUvRXd7w
Static task
static1
Behavioral task
behavioral1
Sample
private server/death.gpj.scr
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
private server/death.gpj.scr
Resource
win10v2004-20240802-en
Malware Config
Extracted
https://master-repogen.vercel.app/file/server.scr
Extracted
C:\wlJ8FiR2h.README.txt
lockbit
http://lockbitsupt7nr3fa6e7xyb73lk6bw6rcneqhoyblniiabj4uwvzapqd.onion
http://lockbitsupuhswh4izvoucoxsbnotkmgq6durg7kficg6u33zfvq3oyd.onion
http://lockbitsupn2h6be2cnqpvncyhj4rgmnwn44633hnzzmtxdvjoqlp7yd.onion
http://lockbitsupp.uz
http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion
http://lockbitapt5x4zkjbcqmz6frdhecqqgadevyiwqxukksspnlidyvd7qd.onion
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion
http://lockbitapt34kvrip6xojylohhxrwsvpzdffgs5z4pbbsywnzsbdguqd.onion
http://lockbitaptc2iq4atewz2ise62q63wfktyrl4qtwuk5qax262kgtzjqd.onion
http://lockbitaptjpikdqjynvgozhgc6bgetgucdk5xjacozeaawihmoio6yd.onion
http://lockbitaptq7ephv2oigdncfhtwhpqgwmqojnxqdyhprxxfpcllqdxad.onion
http://lockbitaptstzf3er2lz6ku3xuifafq2yh5lmiqj5ncur6rtlmkteiqd.onion
http://lockbitaptoofrpignlz6dt2wqqc5z3a4evjevoa3eqdfcntxad5lmyd.onion
Targets
-
-
Target
private server/death.gpj.scr
-
Size
466KB
-
MD5
0fdbc8c24e84eea10dc25e81765014a1
-
SHA1
2d566a2b94fc8b16b97200392db1bbe714c31289
-
SHA256
e173dd358ec750f561ec4eec0c6d75e8709bc32fbe43a5e9a92dd0db96c82b58
-
SHA512
3cb0c09cc5303f7842fd5ba79a118f62586c4f494a2168c6103db55697fe9dc063f866ec5ee8fc208e01cfe7d7e6b044847c824ee28ed7b4ba41d035fb7da72f
-
SSDEEP
12288:CgZXEAO/BUdG3gVdt7Kdm5bakhM/7xah42prW1:CgZXoZUTVdt7K0JakhM1ah42prW1
-
Rule to detect Lockbit 3.0 ransomware Windows payload
-
Renames multiple (603) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-