Skip to main content

New LockBit 5.0 Targets Windows, Linux, ESXi

Medium
Published: Mon Sep 29 2025 (09/29/2025, 08:13:16 UTC)
Source: AlienVault OTX General

Description

Trend Research analyzed the latest version of LockBit ransomware, LockBit 5.0, which exhibits advanced obfuscation, anti-analysis techniques, and cross-platform capabilities for Windows, Linux, and ESXi systems. The Windows variant uses heavy obfuscation and packing, loading its payload through DLL reflection and implementing anti-analysis techniques. The Linux variant has similar functionality with command-line options for targeting specific directories and file types. The ESXi variant specifically targets VMware virtualization infrastructure. All variants use randomized 16-character file extensions, have Russian language system avoidance, and clear event logs post-encryption. The existence of multiple variants confirms LockBit's continued cross-platform strategy, enabling simultaneous attacks across entire enterprise networks including virtualized environments.

AI-Powered Analysis

AILast updated: 09/29/2025, 08:47:38 UTC

Technical Analysis

LockBit 5.0 is the latest iteration of the LockBit ransomware family, exhibiting significant advancements in its capabilities and targeting scope. This ransomware strain is cross-platform, with distinct variants designed to infect Windows, Linux, and VMware ESXi environments. The Windows variant employs heavy obfuscation and packing techniques, including DLL reflection to load its payload, which complicates detection and analysis. It also incorporates multiple anti-analysis mechanisms to evade sandboxing and forensic inspection. The Linux variant mirrors much of this functionality, with added command-line options allowing attackers to specify target directories and file types, increasing the precision and efficiency of encryption operations. The ESXi variant is specialized to attack VMware virtualization infrastructure, a critical component in many enterprise data centers, enabling the ransomware to disrupt virtualized workloads directly. All variants use randomized 16-character file extensions for encrypted files, making automated detection harder. They also include a Russian language system avoidance feature, likely to reduce the risk of self-infection or targeting systems in Russia, and clear event logs after encryption to hinder incident response and forensic investigations. The presence of multiple variants underscores LockBit's strategic focus on comprehensive network-wide attacks, including virtualized environments, allowing simultaneous encryption of diverse systems within an enterprise. Despite the sophistication, there are no known exploits in the wild specifically tied to this version, but the threat actor behind LockBit remains active and capable. This ransomware aligns with MITRE ATT&CK techniques such as T1486 (Data Encrypted for Impact), T1490 (Inhibit System Recovery), T1070.001 (Clear Windows Event Logs), T1140 (Deobfuscate/Decode Files or Information), and others related to obfuscation, anti-analysis, and persistence.

Potential Impact

For European organizations, the impact of LockBit 5.0 could be severe due to its ability to simultaneously target multiple operating systems and virtualized infrastructures common in enterprise environments. The ransomware's capability to encrypt data across Windows, Linux, and VMware ESXi hosts means that entire IT ecosystems, including critical virtual machines and services, can be rendered inoperable. This can lead to significant operational disruption, data loss, and financial damage from ransom payments or recovery costs. The clearing of event logs and anti-analysis features complicate incident response and forensic investigations, potentially prolonging downtime and increasing recovery expenses. Given the ransomware's avoidance of Russian language systems, European organizations are more likely targets. The ransomware's cross-platform nature also means that organizations with heterogeneous environments, such as those in finance, manufacturing, healthcare, and government sectors, face heightened risk. Additionally, the targeting of ESXi hosts threatens virtualized data centers, which are prevalent in Europe, potentially impacting cloud service providers and enterprises relying on virtualization for critical workloads. The medium severity rating reflects the complexity of the attack and the need for sophisticated defenses, but the broad scope and potential for widespread disruption make it a significant threat.

Mitigation Recommendations

1. Implement robust network segmentation to isolate critical systems, especially separating virtualization infrastructure from general user networks. 2. Enforce strict access controls and multi-factor authentication for administrative accounts managing Windows, Linux, and ESXi hosts to reduce the risk of credential compromise. 3. Regularly update and patch all operating systems and virtualization platforms to minimize exploitable vulnerabilities, even though no specific exploits are currently known for LockBit 5.0. 4. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting obfuscation, DLL reflection, and anti-analysis behaviors indicative of LockBit activity. 5. Monitor for unusual file extension patterns, particularly the appearance of randomized 16-character extensions, as an early indicator of encryption activity. 6. Maintain and regularly test offline, immutable backups of critical data and virtual machine snapshots to enable recovery without paying ransom. 7. Enable comprehensive logging and forward logs to secure, centralized systems to prevent tampering and facilitate incident response. 8. Conduct regular security awareness training focused on phishing and social engineering, as initial infection vectors often involve user interaction. 9. Use application whitelisting and restrict execution of unauthorized scripts or binaries, especially on ESXi hosts and Linux servers. 10. Employ threat hunting and proactive monitoring for LockBit indicators of compromise (IOCs), including the provided file hashes and behavioral patterns.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.trendmicro.com/en_gb/research/25/i/lockbit-5-targets-windows-linux-esxi.html"]
Adversary
LockBit
Pulse Id
68da3f9ccd5b37095bdef492
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash5e1f61b9c1c27cad3b7a81c804ac7b86
hash95daa771a28eaed76eb01e1e8f403f7c
hash9bcff8da7165977f973ace12dd4c0ce0
hasha1539b21e5d6849a3e0cf87a4dc70335
hashca93d47bcc55e2e1bd4a679afc8e2e25
hash41e1e094c19fffde494c24ef4cab0d7577d5a025
hash561db92000409fe7093964452143ec371f930681
hash801a97a2fe5c3749b713d71172de6eafb961a888
hashc1888ba296f57e87a84411ddfce3cabc4536b142
hashcdd5717fd3bfd375c1c34237c24073e92ad6dccc
hash180e93a091f8ab584a827da92c560c78f468c45f2539f73ab2deb308fb837b38
hash4dc06ecee904b9165fa699b026045c1b6408cc7061df3d2a7bc2b7b4f0879f4d
hash7ea5afbc166c4e23498aa9747be81ceaf8dad90b8daa07a6e4644dc7c2277b82
hash90b06f07eb75045ea3d4ba6577afc9b58078eafeb2cdd417e2a88d7ccf0c0273
hash98d8c7870c8e99ca6c8c25bb9ef79f71c25912fbb65698a9a6f22709b8ad34b6

Threat ID: 68da46bb648a8168815818d8

Added to database: 9/29/2025, 8:43:39 AM

Last enriched: 9/29/2025, 8:47:38 AM

Last updated: 9/30/2025, 12:06:51 AM

Views: 21

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats