3AM is a newly identified Rust-based ransomware family that appeared as a fallback after a LockBit deployment was blocked, with limited spread. The campaign shows initial use of gpresult, Cobalt Strike, and PsExec for discovery and persistence, followed by encryption and Tor-based ransom negotiation; the attackers claim data theft and potential Dark Web leakage. #3AM #LockBit #Rust #CobaltStrike #PsExec #Wput #DarkNet #DarkWeb
Keypoints
- 3AM is a new Rust-based ransomware family observed in a limited attack, used as a fallback after LockBit was blocked.
- The attackers used gpresult, Cobalt Strike, and PsExec for initial access and privilege escalation, plus discovery commands like whoami and netstat.
- They added a new user for persistence and used the Wput tool to exfiltrate data to an FTP server.
- Encryption targets files on the network, appends .threeamtime to encrypted files, creates RECOVER-FILES.txt ransom notes, and marks data with 0x666.
- 3AM attempted to disable or stop security and backup tools, including firewall rules and VSS backups, and used extensive net stop commands against backup tools.
- The campaign’s ransom notes and Tor-based contact imply extortion and possible data sale on Dark Web; they claimed not to leak data unless demanded.
- The initial deployment failed to fully propagate, reaching only three machines with two blocked, indicating limited impact so far.
MITRE Techniques
- [T1082] System Information Discovery – The threat actor used gpresult to dump policy settings; “dump the policy settings enforced on the computer for a specified user.”
- [T1021.002] Remote Services – The attackers used PsExec to escalate privileges and enable remote execution across hosts; “tried to escalate privileges on the computer using PsExec.”
- [T1018] Remote System Discovery – Reconnaissance commands such as whoami, netstat, quser, and net share to enumerate other servers for lateral movement; “reconnaissance commands such as whoami, netstat, quser, and net share, and tried to enumerate other servers for lateral movement with the quser and net view commands.”
- [T1136.001] Create Account – The attackers added a new user for persistence; “added a new user for persistence.”
- [T1041] Exfiltration – Data exfiltration via the Wput tool to an FTP server; “Wput tool to exfiltrate the victims’ files to their own FTP server.”
- [T1486] Data Encrypted for Impact – The ransomware encrypts files, appends a marker, and deletes originals; “The ransomware will then scan the disk and any files matching predefined criteria are encrypted and the original files are deleted… The encrypted files contain a marker string ‘0x666’ followed by the data appended by the ransomware.”
- [T1059] Command and Scripting Interpreter – The malware uses command-line parameters, including “-k” and mutual exclusivity of “-m” and “-h”; “The command-line parameters ‘-m’ and ‘-h’ are mutually exclusive… values ‘local’ and ‘net’”.
- [T1562.004] Disable or Modify System Firewall – The malware runs commands including netsh to alter firewall rules; “netsh.exe” advfirewall firewall set rule “group=Network Discovery” new enable=Yes
- [T1490] Inhibit System Recovery – The malware attempts to delete backups and shadow copies; “wbadmin.exe delete systemstatebackup…” and “vssadmin delete shadows /all /quiet”
Indicators of Compromise
- [Domain] Tor onion domain used for ransom contact – threeam7[REDACTED].onion/recovery
- [File extension] .threeamtime – extension appended to encrypted files
- [File name] RECOVER-FILES.txt – ransom note created in each scanned folder
Read more: https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/3am-ransomware-lockbit