Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Detailed Analysis of LockBit 5.0

0
Medium
Published: Wed Jan 21 2026 (01/21/2026, 10:03:04 UTC)
Source: AlienVault OTX General

Description

LockBit, originating as ABCD ransomware in 2019, has evolved to version 5.0 in September 2025. After a period of inactivity, it resumed operations in December 2025 with a reduced affiliate sign-up fee. LockBit 5.0, nicknamed ChoungDong, consists of a Loader and Ransomware component. The Loader decrypts and executes the payload in memory, while the Ransomware uses ChaCha20 and Curve25519 for encryption. This update significantly enhances evasion techniques and attack efficiency, introducing features like Mutex, Execution Delay, and Wiper. The group's history includes affiliation with the Maze cartel, independent operations, and continuous upgrades. Mitigation strategies involve monitoring process behavior, applying security patches, and preparing for swift responses using provided IoCs and MITRE ATT&CK techniques.

AI-Powered Analysis

AILast updated: 01/21/2026, 23:20:16 UTC

Technical Analysis

LockBit ransomware originated as ABCD ransomware in 2019 and has evolved through multiple versions, with version 5.0 (nicknamed ChoungDong) released in September 2025. After a period of inactivity, the group resumed operations in December 2025, lowering affiliate sign-up fees to attract more operators. The malware architecture consists of two main components: a Loader and the Ransomware payload. The Loader decrypts and executes the ransomware payload directly in memory, reducing disk artifacts and improving evasion against endpoint detection systems. The ransomware uses modern cryptographic algorithms, ChaCha20 for symmetric encryption and Curve25519 for asymmetric key exchange, ensuring strong data encryption and complicating recovery without the decryption key. New evasion techniques include the use of Mutex to prevent multiple instances, execution delays to avoid sandbox detection, and a wiper functionality that can destroy data, increasing the threat severity beyond simple encryption. LockBit’s affiliate model allows multiple threat actors to deploy the ransomware, increasing attack scale and diversity. The group has a history of affiliation with the Maze cartel and has independently upgraded its tools continuously. Indicators of Compromise (IoCs) such as file hashes are available, and the campaign leverages MITRE ATT&CK techniques like process injection (T1055.012) and indicator removal (T1070.006). Although no specific CVEs or exploits are currently known in the wild, the threat’s sophistication and operational history make it a significant risk. Mitigation strategies focus on behavioral monitoring, patch management, and rapid incident response using the provided IoCs and threat intelligence.

Potential Impact

For European organizations, LockBit 5.0 poses a significant threat due to its advanced evasion capabilities and destructive potential. The use of strong encryption algorithms means that encrypted data is effectively inaccessible without paying ransom or having reliable backups. The introduction of a wiper component increases the risk of permanent data loss, which can severely disrupt business operations, especially in critical sectors such as healthcare, finance, manufacturing, and government. The affiliate model and reduced sign-up fees may lead to increased attack frequency and diversity, targeting a wider range of organizations across Europe. The ransomware’s ability to execute payloads in memory complicates detection and response efforts, potentially allowing longer dwell times and more extensive damage. Double-extortion tactics, where data is exfiltrated before encryption, threaten confidentiality and increase regulatory and reputational risks under GDPR and other data protection laws. The medium severity rating reflects the balance between the threat’s capabilities and the current lack of widespread exploitation, but the potential impact on confidentiality, integrity, and availability remains high.

Mitigation Recommendations

European organizations should implement advanced endpoint detection and response (EDR) solutions capable of detecting in-memory execution and process injection techniques. Monitoring for unusual mutex creation and execution delays can help identify LockBit 5.0 activity. Network segmentation and strict access controls should be enforced to limit lateral movement. Regular patching of operating systems and applications is critical to reduce attack surface, even though no specific CVEs are currently exploited. Organizations should maintain and regularly test offline backups to ensure data recovery without paying ransom. Incident response plans must be updated to incorporate LockBit-specific IoCs and MITRE ATT&CK techniques such as T1055.012 (process injection) and T1070.006 (indicator removal). Threat intelligence sharing within industry sectors and with national cybersecurity centers can improve detection and response. User training should emphasize phishing awareness, as initial infection vectors often involve social engineering. Finally, organizations should consider deploying deception technologies to detect ransomware activity early and disrupt execution.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://medium.com/s2wblog/detailed-analysis-of-lockbit-5-0-de92c03441f8"]
Adversary
LockBit
Pulse Id
6970a45822ddea57307db903
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash5e1f61b9c1c27cad3b7a81c804ac7b86
hashd57a61761cc5a210207a42eaa223f40d
hashf79ea684b3d459cf3f9d93dac0818ad5
hashc1888ba296f57e87a84411ddfce3cabc4536b142
hashf91a868859f4136dcf0c4cb1fad68fa0e410c41e
hash180e93a091f8ab584a827da92c560c78f468c45f2539f73ab2deb308fb837b38
hash5fc709c53f1a714c2fe13130458880f90ad02cd72913e90517aa54d32109acc6
hash6abb008fdeede9cddb8ea05c382a89ef654d4d8a88f490719d473d4bfd0705b7

Threat ID: 69715bd34623b1157cf1b95d

Added to database: 1/21/2026, 11:05:55 PM

Last enriched: 1/21/2026, 11:20:16 PM

Last updated: 2/7/2026, 1:57:57 AM

Views: 173

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats