Concrete signature match: Ransomware - Encrypts files and demands payment for 32-bit Windows platform, family Lockbit
This is a concrete detection of the Lockbit ransomware, a malicious program designed to encrypt files on a victim's system and demand a ransom payment for decryption. The malware attempts to terminate system utilities like Task Manager and PowerShell to prevent interference and uses system binaries for execution.
Relevant strings associated with this threat: - LockBit Ransom (PEHSTR_EXT) - http://lockbitks2tvnmwk.onion (PEHSTR_EXT) - LockBit Ransomware (PEHSTR_EXT) - sel.pdb (PEHSTR_EXT) - C:\Work\conti_v (PEHSTR) - xopazalujico sesolemugihamegiroxeced tohakemodexexucibekuxed korusahiwetofevexadopeneborivube (PEHSTR_EXT) - kill loop for taskmgr, cmd, regedit, powershell yes/no (PEHSTR_EXT) - reboot after end encryption of all files or disks yes/no (PEHSTR_EXT) - http://193.233.132.177/ (PEHSTR_EXT) - .exe (PEHSTR_EXT) - ShellExecuteW (PEHSTR_EXT) - data is completely encrypted (PEHSTR_EXT) - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
032690f113289d50b672fb3e95b64c801454e8e07fe3cdcb072efeaabcc7a374Immediately isolate the affected device from the network to prevent further spread. Re-image the system from a known-good, trusted source and restore data from offline backups. Do not pay the ransom and investigate the initial access vector.