General
-
Target
bb894171229d21637bc00c3360afcbf4aa4973e1ca61f424cc15a8f26a06956b
-
Size
372KB
-
Sample
241228-cmp8datnes
-
MD5
6c5dcbdf374073249f3477d0fd439039
-
SHA1
ed2165fe0e5ed5c608230f6c125713d2a0934c28
-
SHA256
bb894171229d21637bc00c3360afcbf4aa4973e1ca61f424cc15a8f26a06956b
-
SHA512
d75b96e95f6972013c41c99cb54e892ee7f7ee54e996465d0ef2f2d21ba9941869b7b06c49bbdcf36814f19ef0105475aea99c3f49098a5f44bcb810bbf21c0f
-
SSDEEP
6144:MLKewcnJHLFaz1ZXmkjr7ZVyf9Mcfj0bGGCM:Dfwh6ZXmk/fcfo
Static task
static1
Behavioral task
behavioral1
Sample
bb894171229d21637bc00c3360afcbf4aa4973e1ca61f424cc15a8f26a06956b.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
bb894171229d21637bc00c3360afcbf4aa4973e1ca61f424cc15a8f26a06956b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Program Files\DVD Maker\es-ES\Restore-My-Files.txt
lockbit
http://lockbit-decryptor.top/?8841DD9B0AC925FFBA0EF8B29B8365F1
http://lockbitks2tvnmwk.onion/?8841DD9B0AC925FFBA0EF8B29B8365F1
Extracted
C:\Users\Admin\Desktop\LockBit-note.hta
http://lockbit-decryptor.top/?8841DD9B0AC925FFBA0EF8B29B8365F1
http://lockbitks2tvnmwk.onion/?8841DD9B0AC925FFBA0EF8B29B8365F1
Extracted
C:\Program Files\dotnet\Restore-My-Files.txt
lockbit
http://lockbit-decryptor.top/?8841DD9B0AC925FFAD5DAE847638CEB3
http://lockbitks2tvnmwk.onion/?8841DD9B0AC925FFAD5DAE847638CEB3
Extracted
C:\Users\Admin\Desktop\LockBit-note.hta
http://lockbit-decryptor.top/?8841DD9B0AC925FFAD5DAE847638CEB3
http://lockbitks2tvnmwk.onion/?8841DD9B0AC925FFAD5DAE847638CEB3
Targets
-
-
Target
bb894171229d21637bc00c3360afcbf4aa4973e1ca61f424cc15a8f26a06956b
-
Size
372KB
-
MD5
6c5dcbdf374073249f3477d0fd439039
-
SHA1
ed2165fe0e5ed5c608230f6c125713d2a0934c28
-
SHA256
bb894171229d21637bc00c3360afcbf4aa4973e1ca61f424cc15a8f26a06956b
-
SHA512
d75b96e95f6972013c41c99cb54e892ee7f7ee54e996465d0ef2f2d21ba9941869b7b06c49bbdcf36814f19ef0105475aea99c3f49098a5f44bcb810bbf21c0f
-
SSDEEP
6144:MLKewcnJHLFaz1ZXmkjr7ZVyf9Mcfj0bGGCM:Dfwh6ZXmk/fcfo
-
Lockbit family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Renames multiple (9341) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
3