General
-
Target
19022025_0642_sample.exe
-
Size
2.3MB
-
Sample
250219-hghh8s1qs9
-
MD5
2bb43b98ef54b9c3bb32c4a4c8820e47
-
SHA1
19843261df014f345e319113c5ac99db2113f2f3
-
SHA256
ca907cf9ee5bba95a35d8fe8b62cbef18037cc2e152b1b3d6f7639007d9fcac1
-
SHA512
b6ba5a9e5bcf0c65885ea5b0923eea588bd737bb58044f7cd60f2f2a4e4bce625610b2d206b5a04e07bfe0f794568fe65c70a615b53f3b75af4081b4259f13df
-
SSDEEP
6144:EfmAKhanXWCqn3qeruVoOd/YaLxXwr1G5SeGylMLZCNVdZTaOVYTL:XhanmL5WtVxXw5G5PMA91A
Static task
static1
Behavioral task
behavioral1
Sample
19022025_0642_sample.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
19022025_0642_sample.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
C:\Program Files\DVD Maker\de-DE\Restore-My-Files.txt
lockbit
http://lockbit-decryptor.top/?91B39B7869A39E4BC1A75FA347355178
http://lockbitks2tvnmwk.onion/?91B39B7869A39E4BC1A75FA347355178
Extracted
C:\Users\Admin\Desktop\LockBit-note.hta
http://lockbit-decryptor.top/?91B39B7869A39E4BC1A75FA347355178
http://lockbitks2tvnmwk.onion/?91B39B7869A39E4BC1A75FA347355178
Extracted
C:\Program Files\dotnet\Restore-My-Files.txt
lockbit
http://lockbit-decryptor.top/?91B39B7869A39E4BB7C6FBAEEFF8014E
http://lockbitks2tvnmwk.onion/?91B39B7869A39E4BB7C6FBAEEFF8014E
Targets
-
-
Target
19022025_0642_sample.exe
-
Size
2.3MB
-
MD5
2bb43b98ef54b9c3bb32c4a4c8820e47
-
SHA1
19843261df014f345e319113c5ac99db2113f2f3
-
SHA256
ca907cf9ee5bba95a35d8fe8b62cbef18037cc2e152b1b3d6f7639007d9fcac1
-
SHA512
b6ba5a9e5bcf0c65885ea5b0923eea588bd737bb58044f7cd60f2f2a4e4bce625610b2d206b5a04e07bfe0f794568fe65c70a615b53f3b75af4081b4259f13df
-
SSDEEP
6144:EfmAKhanXWCqn3qeruVoOd/YaLxXwr1G5SeGylMLZCNVdZTaOVYTL:XhanmL5WtVxXw5G5PMA91A
-
Lockbit family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Renames multiple (9330) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
3