General
-
Target
c6e5a9f39bfc6dc46c2eb7a786948e9d111ddbec5e157c8081f7c22b7d6b3c78.zip
-
Size
168KB
-
Sample
250110-pzxt7svjft
-
MD5
7cd7674bcc4460deea815b10127e8e14
-
SHA1
72c88131f1160190fb0311c3d5ce7b1300c860c5
-
SHA256
192a20e5740cf683ec11f991532c652085502809370987ce5cd37aab99034fa9
-
SHA512
a758c19abf5af4c048e6eb802e4d1cfe8de4f9d92c2f3d744a0ea5550489a4af65fec3c0d15af7a4ec39a79e13af1e8f22c32c367be5e6d55299381498271bc0
-
SSDEEP
3072:4zZfVx5N/yiQMbWOQpw3gjktELtbQEtZk/hn350KfiDXzcVpJpd8W4h4PvaEX:4zvN/nJbWbEmiLEEhp0KaDXzkJpdD4mr
Static task
static1
Behavioral task
behavioral1
Sample
c6e5a9f39bfc6dc46c2eb7a786948e9d111ddbec5e157c8081f7c22b7d6b3c78.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
c6e5a9f39bfc6dc46c2eb7a786948e9d111ddbec5e157c8081f7c22b7d6b3c78.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\Restore-My-Files.txt
lockbit
http://lockbit-decryptor.com/?ADDD79899D34FB7495CCDCC32510FE5C
http://lockbitks2tvnmwk.onion/?ADDD79899D34FB7495CCDCC32510FE5C
Extracted
C:\Users\Admin\Desktop\LockBit-note.hta
Extracted
C:\Program Files\dotnet\Restore-My-Files.txt
lockbit
http://lockbit-decryptor.com/?ADDD79899D34FB74B0B8625ADEB884DC
http://lockbitks2tvnmwk.onion/?ADDD79899D34FB74B0B8625ADEB884DC
Extracted
C:\Users\Admin\Desktop\LockBit-note.hta
Targets
-
-
Target
c6e5a9f39bfc6dc46c2eb7a786948e9d111ddbec5e157c8081f7c22b7d6b3c78.exe
-
Size
247KB
-
MD5
81d9cac2627d252af11b3ced0f2928d8
-
SHA1
1d19670a5eb9ba2399bcb9a967fad24cd75b1f2a
-
SHA256
c6e5a9f39bfc6dc46c2eb7a786948e9d111ddbec5e157c8081f7c22b7d6b3c78
-
SHA512
6b210647985289a2f8bd4c240013617d9e68834a171bff39b4f03982df2253d2ab43bfd3770af9129f956756dd0ff491f067c6d7ab6f371622d3a2f51968a8de
-
SSDEEP
3072:J1rxNteUB+mcyAdSnsMObgqyoGGeV1EZyOdBDT0ynl0Xp8K7:J1rxN5B6mBugqafEpBDT0ylQp
-
Lockbit family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Renames multiple (9324) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
3