LockBit 3.0 Ransomware Unlocked

November 21, 2022

The builder, once extracted, contains the files related to the building process, with the Build directory empty. The commands that make up Build.bat, clear the Build directory, and then call keygen to generate the public and private encryption keys. The next lines that start with “builder”, generate the different variations of the LockBit 3.0 ransomware by supplying the builder with different command line options. Running the Build.bat file, automates the build process and populates the Build directory with a unique instance of the ransomware. The resulting files, briefly described below: DECRYPTION_ID.txt – Text file containing a 16-character victim ID made from the first eight hex bytes of the public key that is used to uniquely identify a victim LB3.exe – Compiled ransomware, which doesn’t require a password LB3Decryptor.exe – Decryptor for the ransomware, which works with all the variations here LB3_pass.exe – Same as LB3.exe however requires a password to run. The password and instructions are found in Password_exe.txt in this directory LB3_RelectiveDLL_DLLMain.dll – Version of the ransomware that is meant to be reflectively loaded and executed in memory LB3_Rundll32.dll – DLL version of ransomware, which doesn’t require a password. LB3_Rundll32_pass.dll – DLL version of ransomware, which requires the password found in the Password_dll.txt file Password_dll.txt – Contains password and instructions for using LB3_Rundll32_pass.dll Password_exe.txt – Contains password and instructions for using LB3_pass.exe priv.key – A private encryption key unique to this build that is used to encrypt victim files pub.key – A public encryption key unique to this build that is used generate various strings that tie this instance of the ransomware to a victim.
Subscribe