IoC Extractor

This IoC extractor identifies Indicators of Compromise (IoCs) by matching patterns, without analyzing the context of the surrounding text. Manual Review and Validation of the extracted IoCs are essential before any action is used.

Lockbit 2.0 Ransomware: TTPs Used in Emerging Ransomware Campaigns

DATE : 2022-02-03T07:00:00
SOURCE : picussecurity.com

FILE_HASH_MD5:
af9ff037caca1f316e7d05db86dbd882
b7f1120bcff47ab77e74e387805feabe
4d25a9242eac26b2240336fb94d62b1e
84866fca8a5ceb187bca8e257e4f875a
f91095ae0e0632b0f630e0c4eb12ba10
b0916724ff4118bf213e31cd198c0afd
6fc418ce9b5306b4fd97f815cc9830e5
66b9ccb41b135f302b3143a5d53f4842

FILE_HASH_SHA1:
844e9b219aaecb26de4994a259f822500fb75ae1
a185904a46b0cb87d38057fc591a31e6063cdd95
c7b2d4a22f788b1b942f993fff33f233dca960ce
038bc02c0997770a1e764d0203303ef8fcad11fb
6c4040f2a76e61c649e1ff4ac564a5951c15d1fa
12ac32d012e818c78d6db790f6e11838ca75db88
95838a8beb04cfe6f1ded5ecbd00bf6cf97cd564
3d532697163e7c33c7c906e8efbb08282d3efd75

FILE_HASH_SHA256:
f3e891a2a39dd948cd85e1c8335a83e640d0987dbd48c16001a02f6b7c1733ae
4de287e0b05e138ab942d71d1d4d2ad5fb7d46a336a446f619091bdace4f2d0a
f32e9fb8b1ea73f0a71f3edaebb7f2b242e72d2a4826d6b2744ad3d830671202
acad2d9b291b5a9662aa1469f96995dc547a45e391af9c7fa24f5921b0128b2c
717585e9605ac2a971b7c7537e6e311bab9db02ecc6451e0efada9b2ff38b474
4bb152c96ba9e25f293bbc03c607918a4452231087053a8cb1a8accb1acc92fd
0545f842ca2eb77bcac0fd17d6d0a8c607d7dbc8669709f3096e5c1828e1c049
d089d57b8b2b32ee9816338e96680127babc5d08a03150740a8459c29ab3ba78

Domain:
securityintelligence.com
pcrisk.com

Url:
https://securityintelligence.com/posts/lockbit-ransomware-attacks-surge-affiliate-recruitment
https://www.pcrisk.com/removal-guides/21605-lockbit-2-0-ransomware