Behavioral task
behavioral1
Sample
LBLeak/Build.bat
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
LBLeak/Build.bat
Resource
win10v2004-20250211-en
Behavioral task
behavioral3
Sample
LBLeak/builder.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
LBLeak/builder.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral5
Sample
LBLeak/keygen.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
LBLeak/keygen.exe
Resource
win10v2004-20250211-en
General
-
Target
LBLeak.zip
-
Size
292KB
-
MD5
2e2b742c193749a0a4980c884e0688c2
-
SHA1
d077620634960e6ac82706970db2158bb6198874
-
SHA256
744214bbe4ab445a2778cc66eb4a8a5b64673b245cfbf3500e14ed70f5906ef1
-
SHA512
dd8e846008ba3327a37393141f4719ff92c06b5bdfcdbad6e2cbc49c1bfb679b0c5cd315b14a7e4ab36cc0c593b1001b536cd5d6e603312c5675b9d666f0381d
-
SSDEEP
6144:dZ+V+SbhfAX6RDoZXFSnsLtby3v/t+nUNEXcFgokhOJcTENhtJlJ:DkmFFbbyHcWcOJ7zJ
Malware Config
Extracted
blackmatter
65.239
Signatures
-
Blackmatter family
-
Lockbit family
-
Rule to detect Lockbit 3.0 ransomware Windows payload 1 IoCs
resource yara_rule static1/unpack001/LBLeak/builder.exe family_lockbit -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/LBLeak/builder.exe unpack001/LBLeak/keygen.exe
Files
-
LBLeak.zip.zip
-
LBLeak/Build.bat
-
LBLeak/builder.exe.exe windows:5 windows x86 arch:x86
d2e26e45dcb84f1062f90f29a9cf0faa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MessageBoxW
kernel32
LoadResource
WriteFile
CreateFileW
ExitProcess
FindResourceW
GetCommandLineW
GetFileSize
GetModuleHandleW
GlobalFree
SizeofResource
LockResource
ReadFile
shell32
CommandLineToArgvW
msvcrt
_wcsicmp
memcpy
memset
sprintf
strchr
strcpy
strlen
strstr
wcscat
wcscpy
wcslen
wcsrchr
localeconv
_stricmp
_strcmpi
tolower
realloc
malloc
free
strtod
strncmp
imagehlp
CheckSumMappedFile
ntdll
RtlFreeHeap
RtlAllocateHeap
NtClose
RtlImageNtHeader
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 439KB - Virtual size: 438KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
LBLeak/config.json
-
LBLeak/keygen.exe.exe windows:5 windows x86 arch:x86
73eeda700d0a0376845c61c44155f4a8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
wsprintfA
kernel32
GetCurrentDirectoryW
WriteFile
CloseHandle
CreateFileW
ExitProcess
GetCommandLineW
GlobalFree
SetCurrentDirectoryW
shell32
CommandLineToArgvW
msvcrt
_wcsicmp
memcpy
memset
free
fputc
exit
calloc
Sections
.text Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE