LockBit Operators Use Stealthy DLL Sideloading to Mask Malicious App as Legitimate One
Operators of LockBit ransomware have improved their tactics, methods, and procedures (TTPs) to avoid detection and increase damage in the always changing world of cyberthreats.
By exploiting DLL sideloading and masquerading, these attackers disguise malicious activities within legitimate system processes, enabling persistence and seamless integration into compromised environments.
DLL sideloading tricks trusted applications into loading malicious libraries, while masquerading renames files and processes to mimic benign ones, making them indistinguishable from routine operations.
This approach not only leverages inherent system trusts but also complicates identification by security tools, as seen in recent campaigns where LockBit payloads were bundled with digitally signed executables.
Evolving Tactics in Ransomware Deployment
Operators initiate attacks by gaining initial access through remote desktop tools like MeshAgent or TeamViewer, uploading and executing files directly on target machines.
Privilege escalation follows, utilizing utilities such as NSSM to run remote access Trojans (RATs) as services often renamed to innocuous filenames like edge.exe.exe or o.exe and PsExec to spawn command prompts under SYSTEM privileges with commands like PsExec64.exe -s -i cmd.
Discovery phases involve tools like net.exe, nltest.exe, and query.exe to enumerate domain users, groups, trusts, and permissions, gathering intelligence for further infiltration.
Credential theft employs TokenUtils.exe to impersonate high-privilege tokens, such as NT AUTHORITYSYSTEM, for executing commands, alongside Sd1.exe for extracting Kerberos tickets from domain controllers.
Lateral movement leverages Group Policy to distribute payloads across networks, including ransomware DLLs, masqueraded executables, and obfuscated PowerShell scripts that generate random keys, encrypt specific file types (e.g., PDFs, documents, images, and code files), and append extensions like .xlockxlock.
Impact is achieved through DLL sideloading examples: the legitimate jarsigner.exe loading a malicious jli.dll to deploy payloads; the renamed MpCmdRun.exe (as
Direct execution of ransomware binaries like encth.exe or dwa.exe further encrypts data, blending with system directories for camouflage.
Defensive Measures Amid LockBit’s Evolution

LockBit, operated by the Syrphid group, has extorted up to $500 million since 2019, but 2024 disruptions, including the indictment of alleged leader Dimitry Khoroshev and the leak of the LockBit 3.0 builder, have democratized its use among unaffiliated actors.
According to the report, these TTPs, observed in targeted campaigns, underscore the need for robust defenses.
Symantec EDR detects anomalies via AI summaries, while Carbon Black alerts on behaviors like Ransom.LockBit, Heur.AdvML.B, and SONAR.Ransomware! g3.
Network protections flag TeamViewer and MeshAgent activities, with C&C domains categorized as high-risk malnets. Behavioral indicators include untrusted processes accessing LSASS or PSEXEC launching suspicious commands.
Organizations should prioritize endpoint detection, anomaly monitoring, and patch management to counter these stealthy methods, as similar techniques could deploy other malware beyond LockBit.
Indicators of Compromise (IOC)
Type | Indicator | Description |
---|---|---|
File SHA-256 | f689ee9af94b00e9e3f0bb072b34caaf207f32dcb4f5782fc9ca351df9a06c97 | Nssm.exe |
File SHA-256 | 5ca8e1d001a2c3800afce017424ca471f3cba41f9089791074a9cb7591956430 | Tokenutils.exe |
File SHA-256 | 0201a6dbe62d35b81d7cd7d7a731612458644b5e3b1abe414b0ea86d3266ab03 | sd1.exe |
File SHA-256 | 1cd644b750884906b707419c8f40598c04f1402e4e93cbf4a33f3254846dc870 | |
File SHA-256 | edcf76600cd11ef7d6a5c319087041abc604e571239fe2dae4bca83688821a3a | mpclient.dll |
File SHA-256 | 011b31d7e12a2403507a71deb33335d0e81f626d08ff68575a298edac45df4cb | |
File SHA-256 | 4147589aa11732438751c2ecf3079fb94fa478a01ac4f08d024fb55f7ffb52f3 | clink_dll_x86.dll |
File SHA-256 | 10f1a789e515fdaf9c04e56b8a5330cfb1995825949e6db8c9eaba4ea9914c97 | jarsigner.exe |
File SHA-256 | 086567b46fca2a27d404d9b61bdb482394e1591dc13f1302b813bb2ddf5e54cf | jli.dll |
File SHA-256 | 6285d32a9491a0084da85a384a11e15e203badf67b1deed54155f02b7338b108 | nxc.exe |
File SHA-256 | 785e5aaecd9430451f4b0bad637658e6afeea1e722b3d0dd674cb6a11f4ce286 | encth.exe, dwa.exe |
File SHA-256 | 24480dbe306597da1ba393b6e30d542673066f98826cc07ac4b9033137f37dbf | o.exe, edge.exe.exe |
Network | msupdate[.]updatemicfosoft[.]com | C&C Domain |
Find this News Interesting! Follow us on Google News, LinkedIn, and X to Get Instant Updates!
Source link