Experts Find Similarities Between New LockBit 3.0 and BlackMatter Ransomware

Home/Compromised, Internet Security, Ransomware, Security Advisory, Security Update/Experts Find Similarities Between New LockBit 3.0 and BlackMatter Ransomware

Experts Find Similarities Between New LockBit 3.0 and BlackMatter Ransomware

Cybersecurity researchers have reiterated similarities involving the hottest iteration of the LockBit ransomware and BlackMatter, a rebranded variant of the DarkSide ransomware strain that closed store in November 2021.

The new variation of LockBit

Identified as LockBit 3. aka LockBit Black, was launched in June 2022, launching a manufacturer new leak web site and what is the incredibly very first ransomware bug bounty plan, together with Zcash as a cryptocurrency payment possibility.

Its encryption method involves appending the extension “HLJkNskOq” or “19MqZqZ0s” to every single and every file and shifting the icons of the locked information to that of the .

ico file that’s dropped by the LockBit sample to kick-begin the infection.

Similarities to BlackMatter ransomware

Researchers have pointed out that portions of LockBit 3.0’s code seem to be borrowed from the BlackMatter ransomware, hence the nickname LockBit Black.

LockBit’s comprehensive similarities to BlackMatter appear from overlaps in the privilege escalation and harvesting routines .

Also of note is its use of a “-pass” argument to decrypt its major plan, a conduct noticed in one more defunct ransomware family named Egregor, proficiently producing the binary more challenging to reverse if the parameter is not available.

In addition, LockBit 3.0 is designed to check the victim machine’s display language to avoid compromising systems associated with the Commonwealth of Independent States (CIS) states.

The improvement also highlights the ongoing results of the RaaS enterprise product, reducing the barrier to entry for extortionists and increasing the get to of ransomware.

Trendmicro says like BlackMatter, LockBit 3.0 also performs these routines:

  • Attempts to log in using credentials from its configuration list to determine if the compromised system is a part of the domain admin that it will use for later routines
  • Terminates and deletes processes and services from its configuration list, a routine similar to that of BlackMatter
  • Wipes the recyle bin folder of every drive
  • Checks a list of computer name hashes to avoid from its configuration list
  • Connects to the C&C server from its configuration list if the flag is set
  • Encrypts network shares and Exchange Mailbox if set in its configuration flag
  • Obtains a list of files, folders, and extensions to be avoided from its configuration list
  • Uses pointed files when encrypting .lnk files 
  • Prints the ransom note on any available printers and modifies the desktop wallpaper
  • Uses the same encryption algorithm as BlackMatter

IOCS

SHA-256Detection name
80e8defa5377018b093b5b90de0f2957f7062144c83a09a56bba1fe4eda932ceRansom.Win32.LOCKBIT.YXCGD
a56b41a6023f828cccaaef470874571d169fdb8f683a75edd430fbd31a2c3f6eRansom.Win32.LOCKBIT.YXCGFT
d61af007f6c792b8fb6c677143b7d0e2533394e28c50737588e40da475c040eeRansom.Win32.LOCKBIT.YXCGD
506f3b12853375a1fbbf85c82ddf13341cf941c5acd4a39a51d6addf145a7a51Ransom.Win32.LOCKBIT.YXCGKT

Follow Us on: Twitter, InstagramFacebook to get the latest security news!

By | 2022-07-28T09:39:27+05:30 July 27th, 2022|Compromised, Internet Security, Ransomware, Security Advisory, Security Update|

About the Author:

FirstHackersNews- Identifies Security

Leave A Comment

Subscribe to our newsletter to receive security tips everday!