- Distribution Method : Mail attachment file
- MD5 : 6207288dec95b1309827ec2b167c52d6
- Major Detection Name : Ransomware/Win.LockBit.R521104 (AhnLab V3), Ransom.Win32.LOCKBIT.YXCIUZ (Trend Micro)
- Encrypted File Pattern : .BBNvvvgMC
- Malicious File Creation Location :
- C:\ProgramData\<Random>.tmp
- C:\ProgramData\BBNvvvgMC.ico
- Payment Instruction File : BBNvvvgMC.README.txt
- Major Characteristics :
- Offline Encryption
- Block processes execution (agntsvc, dbsnmp, excel, mydesktopservice, oracle, thunderbird etc.)
- Delete multi services (EventLog, Sense, vmicvss, vmvss, VSS, WdBoot, WdFilter, WdNisDrv, WdNisSvc)
- After the file is encrypted, it overwrites free disk space via the file “C:\ProgramData\<Random>.tmp” to prevent file recovery.
- Change encrypted file (.BBNvvvgMC) icon (HKEY_CLASSES_ROOT\BBNvvvgMC)
List