BLACK FRIDAY: 2-for-1 offer NOVEMBER 20 - 26 See details

LockBit

41
Global rank
22 infographic chevron month
Month rank
22 infographic chevron week
Week rank
1324
IOCs

LockBit, a ransomware variant, encrypts data on infected machines, demanding a ransom payment for decryption. Used in targeted attacks, It's a significant risk to organizations.

Ransomware
Type
Ex-USSR
Origin
15 September, 2019
First seen
26 July, 2024
Last seen
Also known as
ABCD

How to analyze LockBit with ANY.RUN

Type
Ex-USSR
Origin
15 September, 2019
First seen
26 July, 2024
Last seen

IOCs

IP addresses
50.63.197.201
72.167.106.35
52.60.114.31
198.244.187.248
50.62.160.77
50.63.202.55
184.168.221.18
91.219.236.192
3.33.152.147
198.71.232.3
72.167.191.69
50.63.202.33
86.107.168.9
23.92.208.51
168.100.11.72
174.138.62.35
139.60.160.200
93.190.139.223
185.182.193.120
139.180.184.147
Hashes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lockbitw5gfwjv23v5ytupbpdnc2ei5nqyhnnpoyme2ohqs6tc7jehad.onion
lockbit7ixelt7gn3ynrs3dgqtsom6x6sd2ope4di7bu6e6exyhazeyd.onion
lockbitw2ygzasbt35ffpdb46r4vkej6flm3siyabaxzdodwpiatfgqd.onion
lockbitm7sccjc7254x3lpunyobnaiw2gnkptev2ygipifguf3r7spyd.onion
group.goocasino.org
nullbulge.com
nullblgtk7dwzpfklgktzll27ovvnj7pvqkoprmhubnnb32qcbmcpgid.onion
lockbitqfj7mmhrfa7lznj47ogknqanskj7hyk2vistn2ju5ufrhbpyd.onion
nullbulge.se
nullbulge.co
lockbitcuo23q7qrymbk6dsp2sadltspjvjxgcyp4elbnbr6tcnwq7qd.onion
lockbitkwkmhfb2zr3ngduaa6sd6munslzkbtqhn5ifmwqml4sl7znad.onion
lockbiti7ss2wzyizvyr2x46krnezl4xjeianvupnvazhbqtz32auqqd.onion
lockbitfhzimjqx2v7p2vfu57fpdm5zh2vsbfk5jkjod3k5pszbek7ad.onion
lockbit23xxhej7swdop24cru7ks2w66pw7zgdkydqo6f7wfyfqo7oqd.onion
lockbitck6escin3p33v3f5uef3mr5fx335oyqon2uqoyxuraieuhiqd.onion
lockbit33chewwx25efq6dgkhkw4u7nefudq4ijkuamjfd7x73on6dyd.onion
ofj3oaltwaf67qtd7oafk5r44upm6wkc2jurpsdyih2c7mbrbshuwayd.onion
lockbitsupo7vv5vcl3jxpsdviopwvasljqcstym6efhh6oze7c6xjad.onion
dispossessor.com
Last Seen at

Recent blog posts

post image
See Malicious Process Relationships on a Vis...
watchers 185
comments 0
post image
Brute Ratel C4 Badger Used to Load Latrodectu...
watchers 1028
comments 0
post image
Find Threats Exploiting CrowdStrike Outage w...
watchers 3021
comments 0

What is LockBit ransomware?

LockBit is a ransomware strain and also the name of the hacker group behind it. It mostly targets Windows computers, but it can also encrypt files on Linux and, more recently, MacOS machines. It's one of the biggest ransomware threats out there, making up about a third of all Ransomware-as-a-Service (RaaS) attacks.

Similar to threats such as Revil/Sodinokibi, LockBit works on a Ransomware-as-a-Service model. The main group sells access to the ransomware on underground forums, where they advertise it as the "fastest encryption software in the world." This business model, much like a franchise, has let LockBit grow its operations. Some estimates even suggest that this threat is behind 40% of all ransomware attacks.

Both large and small organizations are potential targets of a LockBit attack. For instance, in February 2023, LockBit was implicated in an incident involving Royal Mail, where the adversaries demanded a staggering $80 million ransom. However, the average demand from this group is considerably lower, around $85,000. This implies that while LockBit can be involved in high-profile attacks on large enterprises, it primarily targets small to medium-sized businesses.

LockBit, like many threats thought to originate from former USSR territories, avoids attacking victims near its likely home base. It verifies the language setting of the infected machine and aborts the attack if the setting is Russian, Romanian, Tatar, or, intriguingly, Arabic.

LockBit promotes itself as an "ethical ransomware gang." Its code of conduct restricts both the core group and its affiliates from targeting healthcare organizations, charities, or social services. Ransom demands are flexibly adjusted based on the victim, with the group typically asking for what they believe is a “fair” amount given the damage caused and the victim's ability to pay.

However, if a victim fails to meet their demands, LockBit doesn't hesitate to release the stolen sensitive data on their portal, which they host on the Tor network.

Interestingly, LockBit maintains its own website, which is rather professional-looking. This is indicative of a highly organized ransomware operation. They even run a bug bounty program — the only ransomware crew to do so.

LockBit's bug bounty program LockBit ransomware website offers a bug bounty program

However, the reliability of LockBit's crew promises leaves much to be desired, unsurprisingly. A notable instance of this occurred when the crew issued a challenge on a popular cybersecurity forum, Xss [.] is, offering to pay $1,000 to anyone bold enough to permanently tattoo the ransomware's logo.

Some individuals ill-advisedly participated and were subsequently tricked. The LockBit crew publicly revealed all of their Bitcoin wallets shortly after this audacious marketing stunt concluded.

LockBit ransomware version history

Since its initial detection in 2019, LockBit has undergone several iterations to enhance its malicious capabilities.

The first significant update, known as LockBit 2.0 or LockBit Red, was released in mid-2021. The next substantial upgrade occurred in June 2023. This version, referred to as LockBit 3.0 or LockBit Black, introduced the ability to accept additional parameters for specific operations in lateral movement, as well as the capability to reboot into Safe Mode.

Additionally, if an affiliate doesn't have access to a passwordless LockBit 3.0 ransomware, then providing a password parameter becomes essential during the ransomware's execution.

As of this writing, researchers suspect that LockBit is on the verge of its most significant shift in target selection since its initial detection. Researchers have discovered what they believe to be test versions of encryptors for macOS, ARM, FreeBSD, MIPS, and SPARC CPUs. These encryptors contain references to VMware ESXi and a list of Windows file extensions and folders, all of which are out of place on a macOS device. Furthermore, the code crashes due to a buffer overflow bug, suggesting it is still a work in progress.

LockBit's public representative later confirmed that a macOS encryptor is indeed under active development. Given these findings, it appears probable that a new major version of LockBit will be released soon, capable of targeting a significantly broader range of devices.

Get started today for free

Easily analyze emerging malware with ANY.RUN interactive online sandbox

Register for free

LockBit ransomware technical details

Once LockBit secures its initial foothold in a system, it typically launches its operations via the command line. It accepts file paths or directory parameters to selectively encrypt targets. In certain scenarios, this ransomware can also carry out its attack via scheduled tasks or using the post-exploitation tool, PowerShell Empire.

LockBit also uses tools like Mimikatz to gather additional credentials, widening its potential impact. To evade detection, it employs GMER, PC Hunter, or Process Hacker to disable security products. Additionally, it's been observed disabling Windows Defender by altering Group Policy settings.

In addition, LockBit employs tools like Network Scanner, Advanced Port Scanner, and AdFind for discovery purposes. It uses these to enumerate connected machines, aiming to find Domain Controllers or Active Directory servers — high-value targets for ransomware deployment.

The ransomware facilitates lateral movement within the network by self-propagating via SMB connections using acquired credentials. Tools like PsExec or Cobalt Strike are occasionally used for this task.

Data is often exfiltrated using cloud storage tools like MEGA or FreeFileSync, or through the StealBit malware. Following exfiltration, the ransomware payload initiates an encryption routine, affecting both local and network data. LockBit employs AES for file encryption, with the AES key subsequently encrypted using RSA. A classic indicator of a LockBit attack is the replacement of the desktop wallpaper with a ransom note and an insider or affiliate recruitment statement.

LockBit ransomware execution

In the initial phase of its operation, LockBit implements privilege escalation. Following this, the now-elevated process executes a sequence of data recovery exceptions with the assistance of built-in Windows tools. Subsequently, it clears the logs, and then the software commences the file encryption process.

LockBit's process tree LockBit 1.0 process tree looks wild

It's important to note that LockBit ransomware exists in multiple active versions, and the sample we've analyzed is LockBit 1.0. Differences might be encountered when dealing with LockBit 3.0 or LockBit Black, as it is otherwise known.

LockBit ransomware distribution

LockBit ransomware employs an array of tactics and tools to infiltrate systems, typically leveraging affiliates who purchase access to targets from other cybercriminals. This access is often gained through phishing attacks, exploiting vulnerable applications, or brute-forcing Remote Desktop Protocol (RDP) accounts.

Initial access is commonly accomplished via compromised servers or RDP accounts, with insecure RDP or VPN credentials typically procured from affiliates or obtained through brute-force attacks. In some instances, LockBit takes advantage of vulnerabilities such as Fortinet VPN’s CVE-2018-13379.

LockBit ransomware: conclusions

Given its prevalence, LockBit ranks as a high-priority ransomware threat for cybersecurity professionals. It indiscriminately targets both small businesses and large corporations, provided the attackers deem the potential victim to be fair game.

Most concerning is LockBit's recent development of a MacOS encryptor. This evolution could position LockBit as the first major ransomware operation to heavily target Apple devices. This shift could be particularly lucrative, as some Apple users mistakenly believe they are inherently protected from malware on MacOS and may not maintain the same level of vigilance as those operating on Windows or Linux systems.

Considering LockBit's attack history and our analysis of this threat, it's highly probable that it will remain a significant player in the ransomware landscape. Analyze LockBit in ANY.RUN to establish a robust defensive framework and counter this threat.

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Amadey screenshot
Amadey
amadey
Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
WarZone screenshot
WarZone
warzone avemaria stealer trojan rat
WarZone RAT is a remote access trojan, which is written in C++ and offered as a malware-as-a-service. It packs a wide range of capabilities, from stealing victims’ files and passwords to capturing desktop activities. WarZone RAT is primarily distributed via phishing emails and receives regular updates from its C2.
Read More