MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 637be4d4df565ad9299be22e19deacaa343f05d56fb9ea0a201fb012ac8f4df9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LockBit


Vendor detections: 14


Intelligence 14 IOCs YARA 7 File information Comments

SHA256 hash: 637be4d4df565ad9299be22e19deacaa343f05d56fb9ea0a201fb012ac8f4df9
SHA3-384 hash: ea59237f779c89214e0687de9d1806f2b7c15b2489dda12ee17977372ea27e7350bb6f9bffb93d9a5773d926c15a14b6
SHA1 hash: ed69c7493d53fb91758d5c0145e0e35abc2ab3fc
MD5 hash: c747d254c6d42c00e4150288a6198a47
humanhash: carpet-salami-victor-artist
File name:test_pass.exe
Download: download sample
Signature LockBit
File size:157'184 bytes
First seen:2025-12-06 17:31:25 UTC
Last seen:2025-12-06 19:32:55 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 3bc510de773c954bd69d33670cb624d6 (10 x BlackMatter, 3 x LockBit)
ssdeep 3072:mY+xaCkDC5Gvuy7rEMdZy6BTJ1GqiTLR6EiWuOlUnUKZaV:mJqC5lyfdZy6ZGzVUn/aV
Threatray 5 similar samples on MalwareBazaar
TLSH T118E312A341075D79DB89297BCE5C263C962D6E806E50F5E578A8F803DCF38FFA900459
TrID 25.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
19.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
17.1% (.EXE) Win32 Executable (generic) (4504/4/1)
7.8% (.EXE) Win16/32 Executable Delphi generic (2072/23)
7.8% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter juroots
Tags:exe lockbit

Intelligence


File Origin
# of uploads :
3
# of downloads :
83
Origin country :
CH CH
Vendor Threat Intelligence
No detections
Malware family:
n/a
ID:
1
File name:
test_pass.exe
Verdict:
No threats detected
Analysis date:
2025-12-06 17:45:56 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
94.1%
Tags:
virus xpack
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-12-06T15:27:00Z UTC
Last seen:
2025-12-06T18:41:00Z UTC
Hits:
~10
Detections:
VHO:Trojan-Ransom.Win32.Convagent.gen Trojan-Ransom.Win32.Lockbit.sb HEUR:Trojan-Ransom.Win32.Generic
Malware family:
BlackMatter Ransomware
Verdict:
Malicious
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout Win 32 Exe x86
Threat name:
Win32.Ransomware.Lockbit
Status:
Malicious
First seen:
2025-12-06 14:53:14 UTC
File Type:
PE (Exe)
AV detection:
22 of 24 (91.67%)
Threat level:
  5/5
Result
Malware family:
lockbit
Score:
  10/10
Tags:
family:lockbit discovery ransomware
Behaviour
Program crash
System Location Discovery: System Language Discovery
Lockbit
Lockbit family
Rule to detect Lockbit 3.0 ransomware Windows payload
Verdict:
Suspicious
Tags:
ransomware lockbit
YARA:
RAN_Lockbit_v3_Jun_2022_1 RANSOM_Lockbit_Black_Packer Windows_Ransomware_Lockbit_369e1e94 LockBit3
Unpacked files
SH256 hash:
637be4d4df565ad9299be22e19deacaa343f05d56fb9ea0a201fb012ac8f4df9
MD5 hash:
c747d254c6d42c00e4150288a6198a47
SHA1 hash:
ed69c7493d53fb91758d5c0145e0e35abc2ab3fc
Detections:
win_lockbit_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CyberCrime_LockBit_Ransomware
Author:gmrdkd@s2w.inc
Description:Detection LockBit 3.0/Black rule
Rule name:LockBit3_ransomware
Author:BlackBerry
Description:Rule detecting Lockbit3 ransomware samples
Rule name:LockbitBlack_Loader
Author:Zander Work
Description:Hunting rule for the Lockbit Black loader, based on https://twitter.com/vxunderground/status/1543661557883740161
Rule name:RANSOM_Lockbit_Black_Packer
Author:SECUINFRA Falcon Team
Description:Detects the packer used by Lockbit Black (Version 3)
Reference:https://twitter.com/vxunderground/status/1543661557883740161
Rule name:RAN_Lockbit_v3_Jun_2022_1
Author:Arkbird_SOLG
Description:Detect the lockbit ransomware
Reference:https://twitter.com/vxunderground/status/1543661557883740161
Rule name:Windows_Ransomware_Lockbit_369e1e94
Author:Elastic Security
Rule name:win_lockbit_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.lockbit.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

LockBit

Executable exe 637be4d4df565ad9299be22e19deacaa343f05d56fb9ea0a201fb012ac8f4df9

(this sample)

  
Delivery method
Distributed via web download

Comments