Lockkey Golang Ransomware

    Date: 08/30/2024

    Severity: Critical

    Summary

    Lockkey is a ransomware variant developed in the Go programming language, which may offer better cross-platform compatibility and resilience compared to those written in C++. Although detailed technical mechanisms are not publicly available, the following outlines common ransomware behaviors and potential areas for analysis.

    Indicators of Compromise (IOC) List

    Hash

    eb58cbfca307a9d3cfe718d772f7a53079db87bc8936023d6b7adb8cf7206711

    Filename

    ВОССТАНОВИТЬ ФАЙЛЫ.txt

    MessageBox

    “Система вашей компании была полностью скомпрометирована. Все ваши критические данные были зашифрованы.”

    “Locker”

    Gurucul Threat Detection and Incident Response (TDIR) Queries for Detection

    Hash

    sha256hash IN ("eb58cbfca307a9d3cfe718d772f7a53079db87bc8936023d6b7adb8cf7206711")

    Query 1

    (resourceName = "Sysmon"  AND eventtype = "11"  ) AND targetfilename In ("ВОССТАНОВИТЬ ФАЙЛЫ.txt")

    Query 2

    (Technologygroup = "EDR" AND eventtype = "11"  ) AND targetfilename In ("ВОССТАНОВИТЬ ФАЙЛЫ.txt")

    Reference:

    https://gurucul.com/blog/lockkey-golang-ransomware/


    Tags

    MalwareRansomwareGurucul

    « Previous ArticleNext Article »

    Comments

    No records to display

    Looking for Something?
    Threat Research Categories:
    Tags