Lilith Ransomware (.lilith)
#1
Lilith Ransomware (.lilith) (2025. 01. 04. 660)
 
AppCheck Anti-Ransomware : Lilith Ransomware (.lilith) Block Video

Distribution Method : Unknown
 
MD5 : b7a182db3ba75e737f75bda1bc76331a
 
Major Detection Name : Ransomware/Win.LILITHCRYPT.C5205307 (AhnLab V3), Trojan.Ransom.Lilith.B (BitDefender)
 
Encrypted File Pattern : .lilith
 
Payment Instruction File : Restore_Your_Files.txt
 
Major Characteristics :
 
  • Offline Encryption
  • Recovery Partition (M:\) + EFI System Partition (N:\) drives are activate.
  • Block processes execution (agntsvc.exe, dbsnmp.exe, ocssd.exe, oracle.exe, sql.exe, synctime.exe etc.)



More Info HERE

Content lifted from CheckMAL site with permission
[-] The following 1 user says Thank You to jasonX for this post:
  • harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Adobe Acrobat Reader DC 2025.001.20521
Adobe Acrobat Read...harlan4096 — 07:40
Panda Free Anti-Virus 22.03.04
Panda Free Anti-Vi...harlan4096 — 07:38
Google Chrome 137.0.7151.68/.69
Google Chrome 137....harlan4096 — 07:37
Microsoft Edge 137.0.3296.58
Version 137.0.3296...harlan4096 — 07:34
Thunderbird version 139.0.1
Thunderbird versio...harlan4096 — 07:33

[-]
Birthdays
Today's Birthdays
avatar (49)eapedDow
avatar (46)Carlosskake
Upcoming Birthdays
avatar (47)BrantgoG
avatar (41)tapedDow
avatar (48)rapedDow
avatar (43)Johnsonsyday
avatar (48)Groktus
avatar (40)efodo
avatar (38)Tedscolo
avatar (45)brakasig
avatar (44)JamesReshy
avatar (46)Francisemefe
avatar (39)leoniDup
avatar (38)Patrizaancem
avatar (50)smudloquask
avatar (45)benchJem
avatar (38)biobdam
avatar (41)zacforat
avatar (46)NemrokReks
avatar (49)Jasoncedia
avatar (37)Barrackleve
avatar (39)Julioagopy
avatar (49)aolaupitt2558
avatar (47)vadimTob
avatar (37)leannauu4
avatar (39)storoBox
avatar (47)kinotHeemn
avatar (38)Ceballos1976
avatar (39)efynu
avatar (31)horancos

[-]
Online Staff
There are no staff members currently online.

>