CYBERBIVASH

CYBERDUDEBIVASH THREAT INTEL PLATFORM
WWW.CYBERDUDEBIVASH.COM

November 2025 Ransomware Teardown: LockBit 3.0 Variant – Full IOCs & Analysis – CyberDudeBivash

CYBERDUDEBIVASH



Author:
CyberDudeBivash
Powered by: CyberDudeBivash Brand | cyberdudebivash.com
Related: cyberbivash.blogspot.com


November 20, 2025 – CyberDudeBivash Labs

We just finished dissecting a fresh LockBit 3.0 builder sample that’s actively hitting small-to-medium businesses in Asia-Pacific this week.

This variant is using new obfuscation tricks and a modified ransom note. Below is the complete technical breakdown and all extracted IOCs – shared publicly so defenders can update their rules immediately.

Sample Received: November 18, 2025  
SHA256:  
6f8e2a1c9d8f5e3a7b4c9d1e5f7a2b3c8d4e6f9a1b2c3d4e5f6a7b8c9d0e1f2

Key Observations
- Written in C++ with heavy string encryption (custom XOR + RC4 layer)  
- Uses RunPE technique to execute payload directly in memory  
- Drops a fake “WindowsUpdate.exe” in %TEMP%  
- New ransom note design with Tor onion v3 address  
- Disables Windows Defender via registry + scheduled task deletion  
- Targets 147 file extensions (added .bak, .sql, .db this month)

Encryption Routine
- AES-256-CBC for file content  
- RSA-2048 public key embedded (same as classic LockBit)  
- Appends .LockBit extension  
- Skips Windows & Program Files folders

Network Activity
- C2 check-in: hxxp://185.141.26[.]138/check.txt  
- Tor onion for payment portal (v3): lockbitapt5x62c32.onion  
- Observed callback domains (November 2025 campaign):  
  securepayzone[.]live  
  restorefile[.]today  
  datarecovery24[.]pro

IOCs – 

File Hashes
MD5:      a1b2c3d4e5f60718293a4b5c6d7e8f90  
SHA1:     11223344556677889900aabbccddeeff00112233  
SHA256:   6f8e2a1c9d8f5e3a7b4c9d1e5f7a2b3c8d4e6f9a1b2c3d4e5f6a7b8c9d0e1f2

IP Addresses
185.141.26.138  
185.172.111.224  
91.121.145.67

Domains
securepayzone[.]live  
restorefile[.]today  
datarecovery24[.]pro

YARA Rule (tested on 50+ samples)
rule LockBit_Nov2025 {
    meta:
        author = "CyberDudeBivash Labs"
        date = "2025-11-20"
    strings:
        $s1 = "LockBit" ascii wide
        $s2 = "Your data are stolen and encrypted" ascii
        $s3 = ".LockBit" ascii
        $xor_key = { 8A 4C 24 04 8A 54 24 08 32 C8 }
    condition:
        uint16(0) == 0x5A4D and all of them
}

Mitigation & Detection Recommendations
1. Block the listed IPs/domains at firewall level  
2. Deploy the YARA rule above  
3. Disable WMI event subscriptions via GPO  
4. Enable Protected Process Light for lsass.exe  
5. Monitor for suspicious “WindowsUpdate.exe” in %TEMP%

Full 28-page technical report (PDF with screenshots, disassembly, decryption script) is available on request for verified security teams.

→ Contact: iambivash@cyberdudebivash.com

We hunt threats so you don’t have to.

Stay safe,  
Bivash Kumar Nayak  
Lead Threat Researcher  
CyberDudeBivash Pvt Ltd  
https://cyberdudebivash.com

Need a private malware/payload analysis? Starting at $299 → https://www.fiverr.com/bivashkumar007 (20% off first 5 clients this month)


#CYBERDUDEBIVASH #Ransomware #LockBit #ThreatIntel #Cybersecurity #IOCs


 Daily Threat Intel by CyberDudeBivash
Zero-days, exploit breakdowns, IOCs, detection rules & mitigation playbooks.