Resubmissions

25/03/2025, 13:29

250325-qrkekswyh1 10

05/02/2025, 11:20

250205-nfn8aawjbj 10

08/07/2024, 19:32

240708-x88l3axelh 10

Analysis

  • max time kernel
    108s
  • max time network
    113s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/03/2025, 13:29

General

  • Target

    LockBit3 RansomWare/keygen.exe

  • Size

    31KB

  • MD5

    5e28c7c900e4dce08366051c22f07f84

  • SHA1

    ec03fd1551d31486e2f925d9c2db3b87ffcd7018

  • SHA256

    bb76f4d10ec2c1d24be904d2ee078f34a6b5bd11f3b40f295e116fea44824b89

  • SHA512

    fb45d7466d8a979ca78202be20175585e8d560a4cfcc81d3ef15edeb2d292cb5a05cdb93718cef685f1c8ee94cabf6c35ff010785d774057d045ba7b8a478a1e

  • SSDEEP

    768:F6+T41GjHbdWCWDwDD01riWpJxKpAQJs/3JGIDLQH:E+U+hHIBpJxixgQ

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\LockBit3 RansomWare\keygen.exe
    "C:\Users\Admin\AppData\Local\Temp\LockBit3 RansomWare\keygen.exe" bcdedit /set shutdown /r /f /t 2
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads