General

  • Target

    SQLi Dumper V10.3.zip

  • Size

    3.6MB

  • Sample

    250206-rhe9yaxjgv

  • MD5

    e7841c492d87017888ead72f8e21cc64

  • SHA1

    f00d94831b114767f4522a7884adcfcb4a9d98ac

  • SHA256

    e5e082480d493d9d8f87ba60943f01d220e4f8f41b4af71e8dd0e5bd8169809b

  • SHA512

    50664d532fad265b32733da8e866894b58acf2760492e99f8cb7c638823c976cbc496a325d61e9729af42329c60e8648b30ebd43f292f8b985a78abbf5d0c926

  • SSDEEP

    98304:lZz5UUds8wXw00OaDX1+ulJ+4hG/jMuI9XtkYj0Lo7on4s:lZz548w10OOX1+uZh+j72H007Ps

Malware Config

Targets

    • Target

      SQLi Dumper V10.3.zip

    • Size

      3.6MB

    • MD5

      e7841c492d87017888ead72f8e21cc64

    • SHA1

      f00d94831b114767f4522a7884adcfcb4a9d98ac

    • SHA256

      e5e082480d493d9d8f87ba60943f01d220e4f8f41b4af71e8dd0e5bd8169809b

    • SHA512

      50664d532fad265b32733da8e866894b58acf2760492e99f8cb7c638823c976cbc496a325d61e9729af42329c60e8648b30ebd43f292f8b985a78abbf5d0c926

    • SSDEEP

      98304:lZz5UUds8wXw00OaDX1+ulJ+4hG/jMuI9XtkYj0Lo7on4s:lZz548w10OOX1+uZh+j72H007Ps

    • Lockbit

      Ransomware family with multiple variants released since late 2019.

    • Lockbit family

    • Rule to detect Lockbit 3.0 ransomware Windows payload

    • Executes dropped EXE

    • Drops desktop.ini file(s)

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks