- Distribution Method : Mail attachment file
- MD5 : af26ad535688c65ec72e70d0acf39606
- Major Detection Name : Ransom.LockBit.Generic (Malwarebytes), Trojan:Win32/Mamson.A!ac (Microsoft)
- Encrypted File Pattern : .lockbit
- Malicious File Creation Location :
- C:\Users\%UserName%\Desktop\LockBit_Ransomware.hta
- C:\Windows\SysWOW64\AE4161.ico
- <Drive Letter>:\AE41615B.lock
- Payment Instruction File : LockBit_Ransomware.hta / Restore-My-Files.txt
- Major Characteristics :
- Offline Encryption
- Block processes execution (Culture.exe, Defwatch.exe, httpd.exe, QBW32.exe, supervise.exe, winword.exe etc.)
- Stop multi services (Acronis, DefWatch, QBIDPService, sophos, sqlagent, veeam etc.)
- Disable system restore (vssadmin delete shadows /all /quiet, wmic shadowcopy delete, bcdedit /set {default} bootstatuspolicy ignoreallfailures, bcdedit /set {default} recoveryenabled no, wmic SHADOWCOPY /nointeractive)
- Delete Volume Shadow Copy Service (Volume Shadow Copy)
- Deletes event log (wevtutil cl application, wevtutil cl security, wevtutil cl system)
- Change encrypted file (.lockbit) icon and display ransom note (%UserProfile%\Desktop\LockBit_Ransomware.hta) when user executes it.
List