TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Trend Micro Research

New LockBit 5.0 Targets Windows, Linux, ESXi

Jacob Santos · 2025-09-25 · Read original ↗

ATT&CK techniques detected

13 predictions
T1486Data Encrypted for Impact
99%
“previous versions. it describes various options and settings for executing the ransomware, including basic options like specifying directories to encrypt or bypass, operation modes such as invisible mode and verbose mode, notes settings, encryption settings, filtering options, an…”
T1486Data Encrypted for Impact
99%
“represents a continuation of the lockbit ransomware family and is not an imitation or rebrand by different threat actors. the preservation of core functionalities while adding new evasion techniques demonstrates the group ' s strategy of incremental improvement to their ransomwar…”
T1486Data Encrypted for Impact
98%
“. 0 in 2021. trend research analysis found that the windows binary uses heavy obfuscation and packing : it loads its payload through dll reflection while implementing anti - analysis techniques like etw patching and terminating security services. meanwhile, the newly discovered l…”
T1486Data Encrypted for Impact
98%
“new lockbit 5. 0 targets windows, linux, esxi ransomware new lockbit 5. 0 targets windows, linux, esxi trend™ research analyzed source binaries from the latest activity from notorious lockbit ransomware with their 5. 0 version that exhibits advanced obfuscation, anti - analysis t…”
T1486Data Encrypted for Impact
98%
“its windows and linux counterparts, ensuring operational consistency for attackers across all platforms. the help menu reveals esxi - specific parameters optimized for virtual machine encryption, including options to target specific directories and vm configuration files. this es…”
T1486Data Encrypted for Impact
97%
“confirms lockbit ' s continued cross - platform strategy, enabling simultaneous attacks across entire enterprise networks including virtualized environments. heavy obfuscation and technical improvements across all variants make lockbit 5. 0 significantly more dangerous than its p…”
T1486Data Encrypted for Impact
97%
“s commitment to cross - platform capabilities. the command - line interface mirrors the windows version ' s formatting and functionality, providing attackers with the same operational flexibility across both platforms. during execution, the linux variant provides detailed logging…”
T1564.006Run Virtual Instance
69%
“s commitment to cross - platform capabilities. the command - line interface mirrors the windows version ' s formatting and functionality, providing attackers with the same operational flexibility across both platforms. during execution, the linux variant provides detailed logging…”
T1486Data Encrypted for Impact
64%
“##6b8f, 9439954e, 9655130f, 23fa53e5, 26336765, 2c1f8e5f, dbeca3c3, dcf04e8c, deed0e56, 60b29d14, 62c32884, 6337ad82, a49fa5e3, a8f16bab, bd071334, 41278147, 4292edd8, 47f1286a, e7aa4057, e7bf305d, f82a288d, 7b39b585, 7f480cf7, 7dd43601 consistent with previous versions, lockbit …”
T1486Data Encrypted for Impact
50%
“stay ahead of evolving threats, trend customers can access trend vision one™ threat insights, which provides the latest insights from trend research on emerging threats and threat actors. trend vision one threat insights emerging threats : lockbit strikes again : updates in versi…”
T1679Selective Exclusion
45%
“previous versions. it describes various options and settings for executing the ransomware, including basic options like specifying directories to encrypt or bypass, operation modes such as invisible mode and verbose mode, notes settings, encryption settings, filtering options, an…”
T1486Data Encrypted for Impact
41%
“comprehensive cross - platform defenses are in place, with particular attention to protecting virtualization infrastructure. lockbit 5. 0 ' s windows, linux, and esxi variants reinforce that no operating system or platform can be considered safe from modern ransomware campaigns. …”
T1055.001Dynamic-link Library Injection
35%
“##ypted file footer. the sample trend research analyzed employs heavy obfuscation through packing. during debugging, we discovered it functions as a binary loader, decrypting a pe binary in memory and loading it via dll reflection methods. this sophisticated loading mechanism sig…”

Summary

Trend™ Research analyzed source binaries from the latest activity from notorious LockBit ransomware with their 5.0 version that exhibits advanced obfuscation, anti-analysis techniques, and seamless cross-platform capabilities for Windows, Linux, and ESXi systems.