Ransomware: Analyzing LockBit
In this lab, you’ll practice ransomware analysis on LockBit 3.0. When you’re finished, you’ll have the necessary skills to perform static and dynamic analysis on the LockBit ransomware and observe its behaviour.
Terms and conditions apply.
Lab info
Lab author
Challenge
Getting Started in the Lab Environment
Here are the initial instructions and explanation of the lab environment. Read this while your environment is busy creating itself from nothing. Yes, this violates physics; we know. How fun!
Challenge
Unpacking Lockbit
Analyzing how LockBit’s uses obfuscation techniques to hide its code.
Challenge
Impairing Defenses
In this challenge we are going to see how LockBit disables the defense system of Windows.
Challenge
Data Encrypted for Impact
Investigate how LockBit encrypts the files on the infected system and network
Challenge
The Last Challenge
Welcome to the final challenge! This is your last chance to experiment in the environment. Clicking Finish Lab will end this little world that flittered into existence just for you.
Provided environment for hands-on practice
We will provide the credentials and environment necessary for you to practice right within your browser.
Guided walkthrough
Follow along with the author’s guided walkthrough and build something new in your provided environment!
Did you know?
On average, you retain 75% more of your learning if you get time for practice.
Recommended prerequisites
- Solid understanding of computer systems, specifically Windows operating systems
- Familiarity with programming languages, particularly C, C++, or assembly
- Experience using malware analysis tools and techniques, such as static and dynamic analysis, reverse engineering, and sandboxing.