Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 64-bit Windows platform, family Lazy
Trojan:Win64/Lazy!rfn is a critical ransomware threat. Technical evidence indicates it attempts to escalate privileges using 'Rotten Potato' techniques before encrypting user files with AES, leaving a ransom note named 'README_encrypted.txt'. The malware is written in Rust and uses advanced methods like shellcode injection for evasion.
Relevant strings associated with this threat:
- LazyCat.local_privilege_escalation.rotten_potato (PEHSTR_EXT)
- ;Beds-Protector-The-Quick-Brown-Fox-Jumped-Over-The-Lazy-Dog (PEHSTR)
- http://goo.gl/YroZm (PEHSTR)
- Jumped-Over-The-Lazy-Dog (PEHSTR)
- syscall.LazyDLL (PEHSTR_EXT)
- LazyDLL).NewProc (PEHSTR_EXT)
- brimstone/go-shellcode.Run (PEHSTR_EXT)
- brimstone/go-shellcode.VirtualProtect (PEHSTR_EXT)
- C:\Users\Public\Music\key.txt (PEHSTR_EXT)
- README_encrypted.txt (PEHSTR_EXT)
- src/bin/ransomware.rs (PEHSTR_EXT)
- Lazy instance has previously been poisoned (PEHSTR_EXT)
- Local\RustBacktraceMutex (PEHSTR_EXT)
- HttpWebRequest (PEHSTR_EXT)
- LazyInitializer (PEHSTR_EXT)
- set_UseShellExecute (PEHSTR_EXT)
- Beds-Protector-The-Quick-Brown-Fox-Jumped-Over-The-Lazy-Dog (PEHSTR_EXT)
- System.Security.Cryptography.AesCryptoServiceProvider (PEHSTR_EXT)
- noSXPFMbbZh2Bafej4.bKHDLoYx25MeUohwr7 (PEHSTR_EXT)
- rJqNEeiWXDvJsanTbLjIo4HO (PEHSTR_EXT)
- VirtualMemSim.Properties (PEHSTR_EXT)
- LazyList (PEHSTR_EXT)
- //cdn.discordapp.com/attachments (PEHSTR_EXT)
- chrome.exe (PEHSTR_EXT)
- dlvr.dll (PEHSTR_EXT)
- libemb.dll (PEHSTR_EXT)
- wwlib.dll (PEHSTR_EXT)
- zlibwapi.dll (PEHSTR_EXT)
- shipinfo.Properties.Resources (PEHSTR_EXT)
- Conquer.Properties.Resources (PEHSTR_EXT)
- COLLECTBIO.Properties.Resources.resources (PEHSTR_EXT)
- DllRegisterServer (PEHSTR_EXT)
- obj\Release\Wagerssi_UI Launcher.pdb (PEHSTR_EXT)
- Mert\Desktop\DiscordTelegram\obj\Release\DiscordTelegram.pdb (PEHSTR_EXT)
- Cioajsefoieafijae (PEHSTR_EXT)
- Fjiocoivjsfiiqwi (PEHSTR_EXT)
- klenecektir. Yedekleme stratejinize g (PEHSTR_EXT)
- backupso.com/download (PEHSTR_EXT)
- Herhangi bir FTP/SFTP (PEHSTR_EXT)
- zamanli.txt (PEHSTR_EXT)
- Backupso.exe (PEHSTR_EXT)
- G:\CXR19\BSF\intel_a\code\bin\PPRDCCCORBA_C.pdb (PEHSTR_EXT)
- PPRDCCCORBA_C.dll (PEHSTR_EXT)
- .ropf (PEHSTR_EXT)
- Riceboy.Riceboy (PEHSTR_EXT)
- transfer.sh/get (PEHSTR_EXT)
- kfvatlgo.dll (PEHSTR_EXT)
- myxntihz.dll (PEHSTR_EXT)
- gpufyikc.dll (PEHSTR_EXT)
- msvhdfuq.dll (PEHSTR_EXT)
- whbelnyr.dll (PEHSTR_EXT)
- tpeufvdx.dll (PEHSTR_EXT)
- opvbzqcs.dll (PEHSTR_EXT)
- mjsuqrk (PEHSTR_EXT)
- ihetaqnm.dll (PEHSTR_EXT)
- npvfxtsz.dll (PEHSTR_EXT)
- jngxazil.dll (PEHSTR_EXT)
- zadvmegt.dll (PEHSTR_EXT)
- kemavwbu.dll (PEHSTR_EXT)
- wrmqvyjg.dll (PEHSTR_EXT)
- zkqhpmrn.dll (PEHSTR_EXT)
- rxdazwqo.dll (PEHSTR_EXT)
- yfkceshn.dll (PEHSTR_EXT)
- nvkalgur.dll (PEHSTR_EXT)
- ncovkerp.dll (PEHSTR_EXT)
- bzustyoj.dll (PEHSTR_EXT)
- roqwesdg.dll (PEHSTR_EXT)
- C:\Windows\System32\opencv_world470.dll (PEHSTR_EXT)
- C:\Windows\System32\ds5w_x64.dll (PEHSTR_EXT)
- cdn.axion.systems/diablo/cf4463f8-6db9-4a8b-9925-16a99a1bdec2.exe (PEHSTR_EXT)
- npqiwudm.dll (PEHSTR_EXT)
- zigqvcfd.dll (PEHSTR_EXT)
- kbiuvfzo.dll (PEHSTR_EXT)
- plbcozuv.dll (PEHSTR_EXT)
- ycnzgdjx.dll (PEHSTR_EXT)
- ka/zG (SNID)
- eswbxmjsziz (PEHSTR_EXT)
- \PPLKiller.pdb (PEHSTR_EXT)
- \Temp\RTCore64.sys (PEHSTR_EXT)
- Dbatic.Resources.resources (PEHSTR_EXT)
- WowOpO.TXT (PEHSTR_EXT)
- payload.bin (PEHSTR_EXT)
- eRClgZbl.exe (PEHSTR_EXT)
- NZRB.x (PEHSTR_EXT)
- ConsoleApplication2.pdb (PEHSTR_EXT)
- download/football.txt (PEHSTR_EXT)
- 156.245.19.127 (PEHSTR_EXT)
- CMD session closed (PEHSTR_EXT)
- C:\Users\localadmin\Downloads\Lilith-master\Lilith-master\x64\Release\Lilith.pdb (PEHSTR_EXT)
- CMD session opened (PEHSTR_EXT)
- lilithRELEASE.exe (PEHSTR_EXT)
- bardg\Documents\diablo\client\bin\x64\Release\client.pdb (PEHSTR_EXT)
- ajTSYRJNanDNI.JGOLBA (PEHSTR_EXT)
- GOfKoBH.(*X_Exr0VpkD).pxroc1 (PEHSTR_EXT)
- IooHIsa1BYJ.(*AyxWYUb).IsLoopback (PEHSTR_EXT)
- EngmT5177t1.DlL (PEHSTR_EXT)
- KUQ4PwoXbg.exe (PEHSTR_EXT)
- ShellExecuteA (PEHSTR_EXT)
- lld.23lenre (PEHSTR_EXT)
- ClassicExplorer32_dll.dll (PEHSTR_EXT)
- DllExportSettingsXml (PEHSTR_EXT)
- <)JS6 (SNID)
- -workspace.pdb (PEHSTR_EXT)
- start cmd /C "color b && title Error && echo (PEHSTR_EXT)
- && timeout /t 5 (PEHSTR_EXT)
- 0t6-+C*Pd2+Wk!e+-.pdb (PEHSTR_EXT)
- testAPP.exE (PEHSTR_EXT)
- sELF.Exe (PEHSTR_EXT)
- KeRNel32.DLl (PEHSTR_EXT)
- A_A^A]A\_^] (PEHSTR_EXT)
- PenaJ\Downloads\Osiris\output\build\osiris.pdb (PEHSTR_EXT)
- fwpuclnt.dll (PEHSTR_EXT)
- KERNEL32.dll (PEHSTR_EXT)
- .dll (PEHSTR_EXT)
- .ctor (PEHSTR_EXT)
- System.IO.Compression (PEHSTR_EXT)
- CompressionMode (PEHSTR_EXT)
- Loader.pdb (PEHSTR_EXT)
- taskkill /FI "IMAGENAME eq dnSpy.exe (PEHSTR_EXT)
- taskkill /FI "IMAGENAME eq HTTPDebuggerUI.exe (PEHSTR_EXT)
- taskkill /FI "IMAGENAME eq ida.exe (PEHSTR_EXT)
- _crypted.exe (PEHSTR_EXT)
- khxdled\santo\build\santo.pdb (PEHSTR_EXT)
- \temp.ps1 (PEHSTR_EXT)
- \temp.bat (PEHSTR_EXT)
- get_LazyLoading (PEHSTR_EXT)
- set_LazyLoading (PEHSTR_EXT)
- Lazy instance has previously been poisonedOnce (PEHSTR_EXT)
- fdisk.exe (PEHSTR_EXT)
- C:\Users\ALIENWARE\Downloads\Telegram Desktop\ConsoleApp1\ConsoleApp1\obj\Debug\ (PEHSTR_EXT)
- SoftwareInstaller.exe (PEHSTR_EXT)
- Skup.Resources (PEHSTR_EXT)
- NJs (PEHSTR_EXT)
- CVE-2024-30088\x64\Release\poc.pdb (PEHSTR_EXT)
- lhnwktp80.dll (PEHSTR_EXT)
- Go build ID: "a2XE2MdOg2bFzkApzkl9/ (PEHSTR_EXT)
- Go build ID: "4B8-iyNma34aKyyPriEp/ (PEHSTR_EXT)
- DllInjectSelf (PEHSTR_EXT)
- C:\Users\ (PEHSTR_EXT)
- 0\src\x64\Release\tulpical.pdb (PEHSTR_EXT)
- navegador/logger.Configure (PEHSTR_EXT)
- main.Execute (PEHSTR_EXT)
- navegador/cmd/navegador (PEHSTR_EXT)
- navegador/logger.(*Logger).SetVerbose (PEHSTR_EXT)
- Software\Bivaji Coms\BivaApp (PEHSTR_EXT)
- `N/>V (SNID)
- tokengrabber.SetTelegramCredentials (PEHSTR_EXT)
- tokengrabber.init (PEHSTR_EXT)
- tokengrabber.SendDMViaAPI (PEHSTR_EXT)
- tokengrabber.sendMessage (PEHSTR_EXT)
- defender.Disable (PEHSTR_EXT)
- utils/browsers.History (PEHSTR)
- )ThunderKitty-Grabber/utils/browsers.Login (PEHSTR)
- ,ThunderKitty-Grabber/utils/tokengrabber.init (PEHSTR)
- browsers.dataBlob (PEHSTR)
- defender.Disable (PEHSTR)
- browsers.CreditCard (PEHSTR)
- 5o\r` (SNID)
- D3;S/ (SNID)
- ILa9j1onAAMadBsyyUJv5cack8Y1WT26yLj/V+ulKp8= (PEHSTR_EXT)
- /thesunwave/pososyamba_bot (PEHSTR_EXT)
- :\Temp (PEHSTR_EXT)
- /c timeout /t 10 & del /f /q (PEHSTR_EXT)
- d3.largesder.com (PEHSTR_EXT)
- Enc_Output.exe (PEHSTR_EXT)
- Desktop\solo\examples\example_win32_directx11\Release\calculator.p (PEHSTR_EXT)
- Software\Yuwei Qusi\Oovi Appc (PEHSTR_EXT)
- gd_.Properties.Resources (PEHSTR_EXT)
- \gd].pdb (PEHSTR_EXT)
- \lol.pdb (PEHSTR_EXT)
- \loader.cpp.bc.obj.pdb (PEHSTR_EXT)
- cmd.exe /c {} (PEHSTR_EXT)
- C:\Windows\System32\ (PEHSTR_EXT)
- X\d{6}\.dat$ (PEHSTR_EXT)
- {}Windows\System32\backup_f64.exe (PEHSTR_EXT)
- {}Windows\System32\czero_log (PEHSTR_EXT)
- schtasks /create /tn "{}" /sc ONLOGON /tr "{}" /rl HIGHEST /f (PEHSTR_EXT)
- SAKURATECH\Project\B290_OneDigiMMIC\MSVC\mr12e\mr12e\mr12e\x64\Release\mr12e.pdb (PEHSTR_EXT)
- Spybot.exe (PEHSTR_EXT)
- trojascreenshot (PEHSTR_EXT)
- .rsrc (PEHSTR_EXT)
- main.AesDecrypt (PEHSTR_EXT)
- main.HexStrToBytes (PEHSTR_EXT)
- main.isNonChinese (PEHSTR_EXT)
- main.isNonChinese.deferwrap1 (PEHSTR_EXT)
- main.isPythonInCDrive (PEHSTR_EXT)
- main.main (PEHSTR_EXT)
- main.isCPULow (PEHSTR_EXT)
- main.HideConsoleWindow (PEHSTR_EXT)
- main.HexParseKey (PEHSTR_EXT)
- /ShellCode/ShellCode (PEHSTR_EXT)
- LazyDLL (PEHSTR_EXT)
- Em/fE47ClCu263lwWIPe3GASleLBc/E (PEHSTR_EXT)
- Anti-VT.exe (PEHSTR_EXT)
- snake.My.Resources (PEHSTR_EXT)
- ExecutePayload (PEHSTR_EXT)
- Stub\obj\Debug\Stub.pdb (PEHSTR_EXT)
- System\CurrentControlSet\Services\Amaterasu (PEHSTR_EXT)
- Registry\Machine\System\CurrentControlSet\Services\Amaterasu (PEHSTR_EXT)
- UwUdisRAT.pdb (PEHSTR_EXT)
- @.ACE0 (PEHSTR_EXT)
- LazyProc (PEHSTR_EXT)
- main.LoadDriver (PEHSTR_EXT)
- fmt.Printf (PEHSTR_EXT)
- fmt.Println (PEHSTR_EXT)
- main.LoadDriver.func3 (PEHSTR_EXT)
- main.LoadDriver.func2 (PEHSTR_EXT)
- main.LoadDriver.func1 (PEHSTR_EXT)
- main.FindProcessByName (PEHSTR_EXT)
- main.FindProcessByName.func1 (PEHSTR_EXT)
- main.RegisterProcessByIOCTL (PEHSTR_EXT)
- good.5dfruitjkgreat (PEHSTR_EXT)
- Cwon.ttheir2Kabundantly.land (PEHSTR_EXT)
- o:\dir_for_builds\bldObj (PEHSTR_EXT)
- sayingr7Zshe.dfruitfuldzfemalegreater (PEHSTR_EXT)
- 6maleyou.re,multiply,Thegreenreplenishfitselfw (PEHSTR_EXT)
- vg05b3wE.Dll (PEHSTR_EXT)
- sELF.eXe (PEHSTR_EXT)
- .managed(t1 (PEHSTR_EXT)
- ScreenCap.png (PEHSTR_EXT)
- shellexec (PEHSTR_EXT)
- `.rsrc (PEHSTR_EXT)
- .idata (PEHSTR_EXT)
- Encrypting payload with ChaCha20+XOR. (PEHSTR_EXT)
- Encrypted payload size: %u bytes. (PEHSTR_EXT)
- Output saved to packed.exe (PEHSTR_EXT)
- \Release\bigDawg.pdb (PEHSTR_EXT)
- SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths (PEHSTR_EXT)
- GetComputerNameW (PEHSTR_EXT)
- d ID: "N2ILNbUimIXCE0IMV_xd/Cin94ZCSPQPVagQSCpa0/cT5BkHWKzhyB0QFem (PEHSTR_EXT)
- schtasks.exe /create /tn "SystemHelperTask" /tr "%s" /sc onlogon /rl HIGHEST /f (PEHSTR_EXT)
- powershell.exe -NoProfile -WindowStyle Hidden -EncodedCommand %s (PEHSTR_EXT)
- 4start /min cmd.exe /c powershell -WindowStyle Hidden (PEHSTR)
- zetolacs-cloud.top (PEHSTR)
- textpubshiers.top (PEHSTR)
- DATA.bat (PEHSTR_EXT)
- notepad.exe (PEHSTR_EXT)
- \x.exe (PEHSTR_EXT)
- WinExec (PEHSTR_EXT)
- crackmy.app/ (PEHSTR_EXT)
- $RMLoader.LoginClassWindows.resources (PEHSTR)
- https://discord.horse/js/bw_bundle.js (PEHSTR_EXT)
- DllExport (PEHSTR_EXT)
- offkeylogger.dll.compressed (PEHSTR_EXT)
- Shellcode executed successfully. (PEHSTR_EXT)
- _new.exe (PEHSTR_EXT)
- MLogin.exe (PEHSTR_EXT)
- http://110.42.4.105 (PEHSTR_EXT)
- \$@I; (PEHSTR_EXT)
- !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT)
- rundll32 (PEHSTR_EXT)
- !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT)
- !#HSTR:ExecutionGuardrails (PEHSTR_EXT)
- !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)72e46c4bb14985ea3efc7a44b00aab5ab8f53350701a15de7d209f2fc85727f2Immediately isolate the affected host from the network to prevent lateral movement. Do not pay the ransom. Reimage the system from a known-good offline backup. Investigate the network for signs of compromise and ensure all systems are patched and endpoint protection is updated.