My title Page contents

A first look at the builder for LockBit 3.0 Black – Malware

A few months after the LockBit gang released version 3.0 of its ransomware, LockBit 3.0 Black, the builder for it has been leaked by what seems to be a disgruntled developer. LockBit has been by far the most widely used ransomware in 2022 and the appearance of the builder could make things worse. It is likely to be popular, so we could see new gangs appear that aren’t affiliated with the LockBit group but use its software, for example. We also expect to see fake packages offered online that infect the person running the builder, rather than building ransomware for them.

The builder turned up in two different places and was leaked using two different online identities. But where it came from and why isn’t really that interesting, certainly not for people looking to defend against it. For that, what it can do and what the implications are, are far more interesting.


Malwarebytes ransomware researchers managed to get their hands on a copy of the builder and found that, sadly, building your own ransomware has never been easier.

The whole builder actually only holds four files: An encryption key generator, keygen.exe, the actual builder.exe, a modifiable configuration file, config.json, and a batch file to build all of the files called build.bat.

The builder offers a high level of customization. In the included example of the configuration file the ransomware operator can choose their own C2 server, choose the processes they want to terminate, modify the ransom note, and so on.

Customised LockBit 3.0 ransom note
Our researcher had some fun with the ransom note

Once the operator has set the configuration they can start a batch file that produces all of the files they need to start a new ransomware campaign.

LockBit 3.0 builder output
All the necessary file will be created by running the builder’s bat file

A blessing in disguise is that thie Lockbit 3.0 Black fixes a decryption bug that was present in previous versions. The new version encrypts and decrypts flawlessly. You absolutely don’t want to infected with ransomware, but if you are, you want the process to be reliably reversible.

encrypting and decrypting
Encrypting and decrypting using LockBit


We recommend reading an expert view on simplifying the fight against ransomware, but to some it up in a few bullet points:

  • Stop initial access by turning off or hardening RDP, having a plan for how and when you’ll do your security updates, and training users to spot malicious emails.
  • Make privilege escalation and lateral movement as hard as possible by using the principle of least privilege, segmenting your network, and deploying EDR.
  • Use an anti-malware solution that can identify ransomware and can roll back infections.
  • Keep your data safe with offsite, offline backups that are out of the reach of attackers.
  • Accept that even with the best defences, breaches can still happen. Prepare a distaster recovery plan.

Article Link: A first look at the builder for LockBit 3.0 Black

Removing Malware Demystified
Spyware and Viruses

Unmasking the Culprit: Removing Malware Demystified

Removing Malware Demystified. In the ever-expanding realm of cyberspace, the lurking shadows of malware are a constant threat. These digital parasites, stealthily infiltrating our systems, can wreak havoc on our digital lives. But fear not, for in this guide, we embark on a mission to unveil the secrets of removing malware and reclaiming control of […]

Read More
Spyware and Viruses

Process of Detecting Virus Infection

Virus Infection In today’s world, viruses have become a constant threat to public health. Viruses can spread quickly and have the potential to cause significant harm to individuals and entire populations. Identifying a viral infection is crucial to determine the best course of treatment and prevent the spread of the virus. In this article, we […]

Read More
Computers and Functions
Spyware and Viruses

Types Computers and Functions

Computers and Functions we do many things with computers, from working, entertaining ourselves, searching for information, and so on. When talking about a computer, many people imagine a device with a monitor, keyboard and mouse that are usually placed on the table. Though, the term computer can be applied to almost any device that has […]

Read More
Open chat
Iam Guest Posting Service
I Have 600 Site
Status : Indexed All
Good DA : 40-60
Different Nice I Category
Drip Feed Allowed
I can instant publish

My Service :
1. I will do your orders maximum of 1X24 hours, if at the time i’am online. I will do a maximum of 1 hour and the process is complete.
2. If any of you orders are not completed a maximum of 1x24 hours, you do not have to pay me, or free.
3. For the weekend, I usually online, that weekend when i’am not online, it means i’am working Monday.
4. For the payment, maximum payed one day after published live link.
5. Payment via paypal account
If you interesting, please reply
Thank You