Detailed Analysis of LockBit 5.0
LockBit, originating as ABCD ransomware in 2019, has evolved to version 5.0 in September 2025. After a period of inactivity, it resumed operations in December 2025 with a reduced affiliate sign-up fee. LockBit 5.0, nicknamed ChoungDong, consists of a Loader and Ransomware component. The Loader decrypts and executes the payload in memory, while the Ransomware uses ChaCha20 and Curve25519 for encryption. This update significantly enhances evasion techniques and attack efficiency, introducing features like Mutex, Execution Delay, and Wiper. The group's history includes affiliation with the Maze cartel, independent operations, and continuous upgrades. Mitigation strategies involve monitoring process behavior, applying security patches, and preparing for swift responses using provided IoCs and MITRE ATT&CK techniques.
AI Analysis
Technical Summary
LockBit ransomware originated as ABCD ransomware in 2019 and has evolved through multiple versions, with version 5.0 (nicknamed ChoungDong) released in September 2025. After a period of inactivity, the group resumed operations in December 2025, lowering affiliate sign-up fees to attract more operators. The malware architecture consists of two main components: a Loader and the Ransomware payload. The Loader decrypts and executes the ransomware payload directly in memory, reducing disk artifacts and improving evasion against endpoint detection systems. The ransomware uses modern cryptographic algorithms, ChaCha20 for symmetric encryption and Curve25519 for asymmetric key exchange, ensuring strong data encryption and complicating recovery without the decryption key. New evasion techniques include the use of Mutex to prevent multiple instances, execution delays to avoid sandbox detection, and a wiper functionality that can destroy data, increasing the threat severity beyond simple encryption. LockBit’s affiliate model allows multiple threat actors to deploy the ransomware, increasing attack scale and diversity. The group has a history of affiliation with the Maze cartel and has independently upgraded its tools continuously. Indicators of Compromise (IoCs) such as file hashes are available, and the campaign leverages MITRE ATT&CK techniques like process injection (T1055.012) and indicator removal (T1070.006). Although no specific CVEs or exploits are currently known in the wild, the threat’s sophistication and operational history make it a significant risk. Mitigation strategies focus on behavioral monitoring, patch management, and rapid incident response using the provided IoCs and threat intelligence.
Potential Impact
For European organizations, LockBit 5.0 poses a significant threat due to its advanced evasion capabilities and destructive potential. The use of strong encryption algorithms means that encrypted data is effectively inaccessible without paying ransom or having reliable backups. The introduction of a wiper component increases the risk of permanent data loss, which can severely disrupt business operations, especially in critical sectors such as healthcare, finance, manufacturing, and government. The affiliate model and reduced sign-up fees may lead to increased attack frequency and diversity, targeting a wider range of organizations across Europe. The ransomware’s ability to execute payloads in memory complicates detection and response efforts, potentially allowing longer dwell times and more extensive damage. Double-extortion tactics, where data is exfiltrated before encryption, threaten confidentiality and increase regulatory and reputational risks under GDPR and other data protection laws. The medium severity rating reflects the balance between the threat’s capabilities and the current lack of widespread exploitation, but the potential impact on confidentiality, integrity, and availability remains high.
Mitigation Recommendations
European organizations should implement advanced endpoint detection and response (EDR) solutions capable of detecting in-memory execution and process injection techniques. Monitoring for unusual mutex creation and execution delays can help identify LockBit 5.0 activity. Network segmentation and strict access controls should be enforced to limit lateral movement. Regular patching of operating systems and applications is critical to reduce attack surface, even though no specific CVEs are currently exploited. Organizations should maintain and regularly test offline backups to ensure data recovery without paying ransom. Incident response plans must be updated to incorporate LockBit-specific IoCs and MITRE ATT&CK techniques such as T1055.012 (process injection) and T1070.006 (indicator removal). Threat intelligence sharing within industry sectors and with national cybersecurity centers can improve detection and response. User training should emphasize phishing awareness, as initial infection vectors often involve social engineering. Finally, organizations should consider deploying deception technologies to detect ransomware activity early and disrupt execution.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Norway
Indicators of Compromise
- hash: 5e1f61b9c1c27cad3b7a81c804ac7b86
- hash: d57a61761cc5a210207a42eaa223f40d
- hash: f79ea684b3d459cf3f9d93dac0818ad5
- hash: c1888ba296f57e87a84411ddfce3cabc4536b142
- hash: f91a868859f4136dcf0c4cb1fad68fa0e410c41e
- hash: 180e93a091f8ab584a827da92c560c78f468c45f2539f73ab2deb308fb837b38
- hash: 5fc709c53f1a714c2fe13130458880f90ad02cd72913e90517aa54d32109acc6
- hash: 6abb008fdeede9cddb8ea05c382a89ef654d4d8a88f490719d473d4bfd0705b7
Detailed Analysis of LockBit 5.0
Description
LockBit, originating as ABCD ransomware in 2019, has evolved to version 5.0 in September 2025. After a period of inactivity, it resumed operations in December 2025 with a reduced affiliate sign-up fee. LockBit 5.0, nicknamed ChoungDong, consists of a Loader and Ransomware component. The Loader decrypts and executes the payload in memory, while the Ransomware uses ChaCha20 and Curve25519 for encryption. This update significantly enhances evasion techniques and attack efficiency, introducing features like Mutex, Execution Delay, and Wiper. The group's history includes affiliation with the Maze cartel, independent operations, and continuous upgrades. Mitigation strategies involve monitoring process behavior, applying security patches, and preparing for swift responses using provided IoCs and MITRE ATT&CK techniques.
AI-Powered Analysis
Technical Analysis
LockBit ransomware originated as ABCD ransomware in 2019 and has evolved through multiple versions, with version 5.0 (nicknamed ChoungDong) released in September 2025. After a period of inactivity, the group resumed operations in December 2025, lowering affiliate sign-up fees to attract more operators. The malware architecture consists of two main components: a Loader and the Ransomware payload. The Loader decrypts and executes the ransomware payload directly in memory, reducing disk artifacts and improving evasion against endpoint detection systems. The ransomware uses modern cryptographic algorithms, ChaCha20 for symmetric encryption and Curve25519 for asymmetric key exchange, ensuring strong data encryption and complicating recovery without the decryption key. New evasion techniques include the use of Mutex to prevent multiple instances, execution delays to avoid sandbox detection, and a wiper functionality that can destroy data, increasing the threat severity beyond simple encryption. LockBit’s affiliate model allows multiple threat actors to deploy the ransomware, increasing attack scale and diversity. The group has a history of affiliation with the Maze cartel and has independently upgraded its tools continuously. Indicators of Compromise (IoCs) such as file hashes are available, and the campaign leverages MITRE ATT&CK techniques like process injection (T1055.012) and indicator removal (T1070.006). Although no specific CVEs or exploits are currently known in the wild, the threat’s sophistication and operational history make it a significant risk. Mitigation strategies focus on behavioral monitoring, patch management, and rapid incident response using the provided IoCs and threat intelligence.
Potential Impact
For European organizations, LockBit 5.0 poses a significant threat due to its advanced evasion capabilities and destructive potential. The use of strong encryption algorithms means that encrypted data is effectively inaccessible without paying ransom or having reliable backups. The introduction of a wiper component increases the risk of permanent data loss, which can severely disrupt business operations, especially in critical sectors such as healthcare, finance, manufacturing, and government. The affiliate model and reduced sign-up fees may lead to increased attack frequency and diversity, targeting a wider range of organizations across Europe. The ransomware’s ability to execute payloads in memory complicates detection and response efforts, potentially allowing longer dwell times and more extensive damage. Double-extortion tactics, where data is exfiltrated before encryption, threaten confidentiality and increase regulatory and reputational risks under GDPR and other data protection laws. The medium severity rating reflects the balance between the threat’s capabilities and the current lack of widespread exploitation, but the potential impact on confidentiality, integrity, and availability remains high.
Mitigation Recommendations
European organizations should implement advanced endpoint detection and response (EDR) solutions capable of detecting in-memory execution and process injection techniques. Monitoring for unusual mutex creation and execution delays can help identify LockBit 5.0 activity. Network segmentation and strict access controls should be enforced to limit lateral movement. Regular patching of operating systems and applications is critical to reduce attack surface, even though no specific CVEs are currently exploited. Organizations should maintain and regularly test offline backups to ensure data recovery without paying ransom. Incident response plans must be updated to incorporate LockBit-specific IoCs and MITRE ATT&CK techniques such as T1055.012 (process injection) and T1070.006 (indicator removal). Threat intelligence sharing within industry sectors and with national cybersecurity centers can improve detection and response. User training should emphasize phishing awareness, as initial infection vectors often involve social engineering. Finally, organizations should consider deploying deception technologies to detect ransomware activity early and disrupt execution.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://medium.com/s2wblog/detailed-analysis-of-lockbit-5-0-de92c03441f8"]
- Adversary
- LockBit
- Pulse Id
- 6970a45822ddea57307db903
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash5e1f61b9c1c27cad3b7a81c804ac7b86 | — | |
hashd57a61761cc5a210207a42eaa223f40d | — | |
hashf79ea684b3d459cf3f9d93dac0818ad5 | — | |
hashc1888ba296f57e87a84411ddfce3cabc4536b142 | — | |
hashf91a868859f4136dcf0c4cb1fad68fa0e410c41e | — | |
hash180e93a091f8ab584a827da92c560c78f468c45f2539f73ab2deb308fb837b38 | — | |
hash5fc709c53f1a714c2fe13130458880f90ad02cd72913e90517aa54d32109acc6 | — | |
hash6abb008fdeede9cddb8ea05c382a89ef654d4d8a88f490719d473d4bfd0705b7 | — |
Threat ID: 69715bd34623b1157cf1b95d
Added to database: 1/21/2026, 11:05:55 PM
Last enriched: 1/21/2026, 11:20:16 PM
Last updated: 2/7/2026, 1:57:57 AM
Views: 173
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Hundreds of Malicious Crypto Trading Add-Ons Found in Moltbot/OpenClaw
MediumThe Godfather of Ransomware? Inside Cartel Ambitions
MediumAI-assisted cloud intrusion achieves admin access in 8 minutes
MediumFake Dropbox Phishing Campaign via PDF and Cloud Storage
MediumTracking the Expansion of ShinyHunters-Branded SaaS Data Theft
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.