The malware employs a clever anti-debugging mechanism using the ptrace system call to attach to its parent process.
If this operation fails, typically when debugging tools like gdb or strace are already tracing the process, the malware immediately exits, effectively evading dynamic analysis attempts.
String obfuscation adds another layer of protection, with nearly all text strings encrypted using a simple XOR routine with a hardcoded value of 0x39 (57 decimal).
This technique conceals critical functionality, including help menus, bash commands for VM navigation, and extensive logging capabilities that ironically make the malware highly verbose once deobfuscated.
The ransomware demonstrates sophisticated knowledge of VMware ESXi environments through targeted bash command execution.
It automatically enables SSH access via vim-cmd hostsvc/enable_ssh and systematically identifies running virtual machines vmdumper -l to extract World IDs (WIDs).
Before encryption, the malware attempts to suspend running VMs up to nine times using esxcli vm process kill --type=force --world-id=$wid, ensuring data integrity during the encryption process.
The malware validates its environment by checking for essential ESXi tools, including. vm-support, vmdumper, and vim-cmd before proceeding with its payload. It can be configured with VM and file extension exclusion lists, demonstrating operational flexibility for targeted attacks.
Analysis revealed a hybrid encryption scheme combining libsodium and optimized AES implementations.
For each file, the malware generates a unique 128-bit encryption key using randombytes_buf, then secures this key within a cryptographic box using crypto_box_seal with a hardcoded public key.
The actual file encryption utilizes an optimized AES implementation featuring T-tables—four lookup tables of 1024 bytes each containing 256 4-byte integers. This approach provides faster encryption performance while maintaining cryptographic security.
Particularly concerning is the malware’s “free space wiping” capability, which overwrites unallocated disk space by creating temporary files and filling them with zeroed data based on filesystem block information, significantly complicating forensic recovery efforts.
The ransomware includes comprehensive logging functionality, writing detailed operation records /tmp/locklog with timestamps and thread IDs, while creating /tmp/locker.pid a mechanism to prevent multiple simultaneous executions.
Despite law enforcement takedowns of Lockbit infrastructure, this technical analysis provides valuable insights into the evolving sophistication of Linux-targeted ransomware families.
Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates
The post Unmasking the Secrets of Lockbit’s Linux ESXi Ransomware – Evasion Tactics and File Encryption Revealed appeared first on Cyber Security News.
Crimson Desert has yet another update, making more significant improvements to Pearl Abyss’ single-player open…
Just as fans come down from The Boys series finale, Prime Video has officially unveiled…
I can think of few activities I'd enjoy more than playing a video game on…
SAP launches its most ambitious AI platform yet in Madrid. With 200+ autonomous agents and…
Ericsson is deploying SAP Business Data Cloud and the Joule AI copilot across its global…
A year ago, AccountsIQ announced that Triathlon Ireland would be implementing its financial solution to…
This website uses cookies.