General
-
Target
lockbit1.7z
-
Size
8.8MB
-
Sample
241202-z39chstjaz
-
MD5
a1beeabd1bccb8266631e4cce53eea26
-
SHA1
917975f62cda9bac4badbb09d4f5e99936e5c30e
-
SHA256
9f3a43ab58c24e5394021009092be2d3ecff413aa57a440542e3b2a827fd9b54
-
SHA512
b6fe92909419e8eddd1eb3139c11ee968f6b6cd1b95073fde356faa707e46ffec42a819c732016175bcc4aac8da187fd75cea7b857fc1e693c6ff8a86aa1815a
-
SSDEEP
98304:ciMFZDHZg7++Bfe65+PdBMgV3c2Xi5DyVZD93tNmD/+IV78ZtUV+kIpOjs7D6c6Z:ciIZD2S+BfD5hEtyVGUEOA/+kU5pXn
Static task
static1
Behavioral task
behavioral1
Sample
29.04.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
29.04.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Program Files\DVD Maker\de-DE\Restore-My-Files.txt
lockbit
http://lockbit-decryptor.com/?BD61F8CA9173670AC976BE61A0955896
http://lockbitks2tvnmwk.onion/?BD61F8CA9173670AC976BE61A0955896
Extracted
C:\Program Files\dotnet\Restore-My-Files.txt
lockbit
http://lockbit-decryptor.com/?BD61F8CA9173670AC82D8590E4B9CE65
http://lockbitks2tvnmwk.onion/?BD61F8CA9173670AC82D8590E4B9CE65
Targets
-
-
Target
29.04.20TASKMNGR
-
Size
148KB
-
MD5
a7637dfb6b9408fe020d9333d0ade6dc
-
SHA1
930c34743ab12c80512723db0aa7b8b4762fcc84
-
SHA256
cea3e8a3e541ae4c928c3cd33f6772f1a69746393ac1a5c4575379a09a92d1e1
-
SHA512
a522e3be00f3c32cd318cca7995e0f6f604a0590de3f4c2830920347328d405d178bdd2c2406e3b835cc5e5037e2d2348456b138878644231af94e51fc4b4e94
-
SSDEEP
3072:ym0ROZIL87L1yoklfzGp3XjRaDyZYMqqD/A+lHlC:ypMCL8rpHjRa0qqD/NjC
-
Lockbit family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Renames multiple (9392) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
2