General
-
Target
20240915bd0c0336958d4b1abda8062d43b277e9lockbit
-
Size
959KB
-
Sample
240915-kwt7pavhjg
-
MD5
bd0c0336958d4b1abda8062d43b277e9
-
SHA1
2c4d2c6262d46313990e31bf7b6437028a566ba8
-
SHA256
2047bb9f00b16a6c8afba9f9a59ca4173a644b6c3b7ff922282a5607f288da89
-
SHA512
d1edf5516f758d0020db7933dd15e8448fb66217c9f0681af8af44916ac5f0429b1008034001fad511daaae12b3a839c216b05b7a64df23ec320228e891ff16c
-
SSDEEP
24576:uLjr3s2nScu1idtz3f++5kRzFxk7rMxNeR1RkqpdsFC:Ujrc2SodFf+B3k79BOI
Static task
static1
Behavioral task
behavioral1
Sample
20240915bd0c0336958d4b1abda8062d43b277e9lockbit.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
20240915bd0c0336958d4b1abda8062d43b277e9lockbit.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Program Files\Java\jdk1.7.0_80\db\bin\Restore-My-Files.txt
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion
https://bigblog.at
http://lockbitsup4yezcd5enk5unncx3zcy7kw6wllyqmiyhvanjj352jayid.onion
http://lockbitsap2oaqhcun3syvbqt6n5nzt7fqosc6jdlmsfleu3ka4k2did.onion
https://decoding.at
Extracted
C:\Program Files\dotnet\Restore-My-Files.txt
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion
https://bigblog.at
http://lockbitsup4yezcd5enk5unncx3zcy7kw6wllyqmiyhvanjj352jayid.onion
http://lockbitsap2oaqhcun3syvbqt6n5nzt7fqosc6jdlmsfleu3ka4k2did.onion
https://decoding.at
Extracted
C:\Users\Admin\Desktop\LockBit_Ransomware.hta
https://decoding.at/
http://lockbitsap2oaqhcun3syvbqt6n5nzt7fqosc6jdlmsfleu3ka4k2did.onion/or
https://decoding.at
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion
https://bigblog.at
Targets
-
-
Target
20240915bd0c0336958d4b1abda8062d43b277e9lockbit
-
Size
959KB
-
MD5
bd0c0336958d4b1abda8062d43b277e9
-
SHA1
2c4d2c6262d46313990e31bf7b6437028a566ba8
-
SHA256
2047bb9f00b16a6c8afba9f9a59ca4173a644b6c3b7ff922282a5607f288da89
-
SHA512
d1edf5516f758d0020db7933dd15e8448fb66217c9f0681af8af44916ac5f0429b1008034001fad511daaae12b3a839c216b05b7a64df23ec320228e891ff16c
-
SSDEEP
24576:uLjr3s2nScu1idtz3f++5kRzFxk7rMxNeR1RkqpdsFC:Ujrc2SodFf+B3k79BOI
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
2