Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

LockBit 3.0: making the ransomware Great Again

Redazione RHC : 6 July 2022 20:33

LockBit is a major player in the ransomware scene and has contributed heavily for this cyber-crime model to become one of the most popular and imitated in the threats landscape.

The version 2.0 of its project entered the scene in July 2021 showing immediately the potential to become one of the leading syndicate in this “business”.

The collective distinguished itself for having pointed out some distintive technical characteristics of its product and for several public statements where the speed and efficiency of its ransomware have been defined, by gang representatives, “unmatched” if compared to what the community had been able to observe up to that moment. Always according to LockBit members the 2.0 project could count on:

  1. The fastest encryption speed on the market
  2. A tool specifically aimed at data exfiltration
  3. Automated mechanisms for payload distribution and data encryption 

Sei un Esperto di Formazione?
Entra anche tu nel Partner program!
Accedi alla sezione riservata ai Creator sulla nostra Academy e scopri i vantaggi riservati ai membri del Partner program.
Per ulteriori informazioni, scrivici ad [email protected] oppure su Whatsapp al 379 163 8765 

Supporta RHC attraverso:


Ti piacciono gli articoli di Red Hot Cyber? Non aspettare oltre, iscriviti alla newsletter settimanale per non perdere nessun articolo

Recently, on 27 of June, 2022, LockBit released the third version of its project and many new features seem to have been included in it. For example one main thing to note that differs from the 2.0 is the fact that the group has come up with another way to pressure and extort its victims.

Like other threat groups, LockBit works mainly through its own DLS (Data Leak Site) through which it manages and deals with the victims of its operations. Until now, these victims were given a well-defined period of time to pay the requested ransom. In project 3.0 the collective seems to have included new possibilities for negotiations; Indeed, by paying a specific fee is now possible to extend the timer by 24 hours, destroy all data from the website, or download all data right away.

This could be a way also to cover the extortion technique, not making public the actual ransom price. Basically, they are maximizing the money they can get from each victim. Another interesting aspect of this third version is the Bug Bounty Program; this appears to be an initiative never taken from any other group before. The group not only offers rewards for finding vulnerabilities or for doxxing the managers but is rewarding for “brilliant ideas” to be added in the R-a-a-S as well.

Currently, however, it’s to be pointed out that the group is continuing to update also the LockBit 2.0 DLS, where new victims have recently been added.

LockBit 3.0

Cluster25 obtained a sample of LockBit 3.0 and analyzed it in order to understand its functionalities and its behavior. During the analysis also emerged interesting similarities between this version and samples related to other ransomware families (BlackMatter/DarkSide) that may suggest a possible correlation between threat groups behind the development of this piece of malware.

The new version of LockBit (Lockbit 3.0 or LockBitBlack) uses a code protection mechanism consisting in the presence of encrypted code sections in the binary, so to hinder the malware detection, especially when performed through automated analysis.

To activate the proper execution of the malware, a decryption key must be provided as a parameter (-pass) when the malicious file is launched, and without this key its behavior just results in a software crash at the beginning of its execution. The decryption key used for the analyzed sample is reported below:

db66023ab2abcb9957fb01ed50cdfa6a

When the program starts, the fist subroutine to be called (sub_41B000) is responsible to perform the decryption of the sections of the binary, by retrieving the decryption key from the execution parameters and by passing it through a RC4 Key Scheduling Algorithm (KSA) algorithm.

Later, the sections to decrypt are accessed by reading the Process Environment Block (PEB) and the decryption takes place, according to evidence below:

An anti-Analysis mechanism implemented by the malware regards the dynamic loading of the Win32 APIs needed to perform its malicious behavior.

The subroutine responsible to load and map the needed APIs into memory is analyzable only on the decrypted/unpacked version of the malware. The way the APIs are resolved consists in a call to a subroutine (sub_407C5C) that receives as input an obfuscated string that is XORed with the key 0x4506DFCA, so to decrypt the Win32 API name to be resolved.

Furthermore, the analysis showed an interesting similarity between this subroutine and the one used in the BlackMatter ransomware.

In fact, the above-mentioned decryption steps are present in both the malware, as also visible in the screenshot below, taken from a BlackMatter sample:

The analysis also showed other sections of the code that are similar between the samples of Lockbit 3.0 and BlackMatter, suggesting a possible correlation between the threat groups behind the implementation of the two ransomware.

To hinder the analysis, LockBit 3.0 also uses string obfuscation, which is done though a simple decryption algorithm (XOR) to decrypt the strings. Regarding the file encryption, the ransomware uses a multi-thread approach. Files are encrypted with AES, in case of large files, not all content is encrypted, but only a part of sections in it.

Moreover, files are renamed replacing filenames and their extension with random dynamic and static string: with the analyzed sample, the extension used was .HLJkNskOq and filenames were replaced by random 7 characters strings (e.g. TIe9pEW.HLJkNskOq).

Also, a new icon is associated with the encrypted files, which is written on the disk in an .ico image file in the directory C:\ProgramData, under the name HLJkNskOq.ico. The ransom note is written in every directory containing encrypted files. It states that data is stolen and encrypted and that if the ransom is not paid it will be published on the darknet.

The ransom note also contains the .onion URLs to the TOR website, and instruct the victim to contact the attackers using the provided websites and personal ID. As usual, the ransom note warns that deleting or modifying the encrypted files will prevent their decryption.

Finally, when the encryption process ends, also the victim’s wallpaper is changed with the image below, which instructs the victim to read the ransom note:

Moreover, LockBit 3.0 also has the capability to print a version of its ransom note using connected printers using WinSpool APIs, as can be seen by the process splwow64.exe launched after the malware execution. The printed file is shown below:

Finally, one of the last operations performed by the malware consists in setting a considerable amount of modification in the keys of the Windows Registry related to the Windows Event Log, in order to disable the monitoring of event such as the one associated with Windows Defender.

These modifications can be traced in the subkeys of the registry starting from

  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\

Where the Enabled subkey associated with each log is set to 0.

Conclusion

The LockBit 3.0 project is proof of the extreme dynamism of the ransomware business. Potentially, the group appears to have acquired skills from other groups that have actively operated in the sector in the past. Interesting the code overlaps between samples of different families, especially the BlackMatter one; However, the relations between the two groups are not casual; on September 2021 Cluster25 observed a coordinated attack handled simultaneously by members of the LockBit and DarkMatter crews.

Despite the observation of simultaneous attacks can be considered a quite common event in the ransomware world, this one is going to confirm once again the high degree of complexity of the Russian-speaking ransomware ecosystem which very often is based on personal relationships between the different teams members. Furthermore, on November 2021, BlackMatter shuts down its activities and declares the quit of its business.

As the BlackMatter gang quitted the operations several team members were transferred to other R-a-a-S partnerships, specifically LockBit. Cluster25 also noted the direct involvement of LockBit representatives in acquiring the members of the BlackMatter group, at that time in the process of winding up, as reported by the image below.

ATT&CK MATRIX

TACTICTECHNIQUEDESCRIPTION
Initial AccessT1566.001Phishing: Spearphishing Attachment
ExecutionT1106Native API
ExecutionT1204.002User Execution: Malicious File
Privilege EscalationT1134Access Token Manipulation
Defense EvasionT1622Debugger Evasion
Defense EvasionT1140Deobfuscate/Decode Files or Information
Defense EvasionT1112Modify Registry

INDICATORS OF COMPROMISE

CATEGORYTYPEVALUE
PAYLOADSHA25680e8defa5377018b093b5b90de0f2957f7062144c83a09a56bba1fe4eda932ce
PAYLOADSHA1f2a72bee623659d3ba16b365024020868246d901
PAYLOADMD538745539b71cf201bb502437f891d799

Redazione
The editorial team of Red Hot Cyber consists of a group of individuals and anonymous sources who actively collaborate to provide early information and news on cybersecurity and computing in general.