SYMBOLCOMMON_NAMEaka. SYNONYMS
win.lorenz (Back to overview)

Lorenz


Tesorion describes Lorenz as a ransomware with design and implementation flaws, leading to impossible decryption with tools provided by the attackers. A free decryptor for 2021 versions was made available via the NoMoreRansom initiative. A new version of the malware was discovered in March 2022, for which again was provided a free decryptor, while the ransomware operators are not able to provide tools to decrypt affected files.

References
2023-02-23Arctic WolfSteven Campbell, Ross Phillips, Seth Battles, Markus Neis
@online{campbell:20230223:getting:2fc517a, author = {Steven Campbell and Ross Phillips and Seth Battles and Markus Neis}, title = {{Getting Dumped: A Trust Relationship Destroyed by Lorenz}}, date = {2023-02-23}, organization = {Arctic Wolf}, url = {https://arcticwolf.com/resources/blog/lorenz-ransomware-getting-dumped/}, language = {English}, urldate = {2023-02-27} } Getting Dumped: A Trust Relationship Destroyed by Lorenz
Lorenz
2022-09-12Arctic WolfMarkus Neis, Ross Phillips, Steven Campbell, Teresa Whitmore, Alex Ammons, Arctic Wolf Labs Team
@online{neis:20220912:chiseling:58925b9, author = {Markus Neis and Ross Phillips and Steven Campbell and Teresa Whitmore and Alex Ammons and Arctic Wolf Labs Team}, title = {{Chiseling In: Lorenz Ransomware Group Cracks MiVoice And Calls Back For Free}}, date = {2022-09-12}, organization = {Arctic Wolf}, url = {https://arcticwolf.com/resources/blog/lorenz-ransomware-chiseling-in/}, language = {English}, urldate = {2022-09-15} } Chiseling In: Lorenz Ransomware Group Cracks MiVoice And Calls Back For Free
Chisel Lorenz
2022-03-21TesorionGijs Rijnders
@online{rijnders:20220321:lorenz:56cc970, author = {Gijs Rijnders}, title = {{Lorenz ransomware rebound: corruption and irrecoverable files}}, date = {2022-03-21}, organization = {Tesorion}, url = {https://www.tesorion.nl/en/posts/lorenz-ransomware-rebound-corruption-and-irrecoverable-files/}, language = {English}, urldate = {2022-04-05} } Lorenz ransomware rebound: corruption and irrecoverable files
Lorenz
2022-02-08CybereasonLior Rochberger
@online{rochberger:20220208:cybereason:42a7ee9, author = {Lior Rochberger}, title = {{Cybereason vs. Lorenz Ransomware}}, date = {2022-02-08}, organization = {Cybereason}, url = {https://www.cybereason.com/blog/cybereason-vs.-lorenz-ransomware}, language = {English}, urldate = {2022-02-10} } Cybereason vs. Lorenz Ransomware
Lorenz
2021-08-05Twitter (@AltShiftPrtScn)Peter Mackenzie
@online{mackenzie:20210805:lorenz:c5b406d, author = {Peter Mackenzie}, title = {{Tweet on Lorenz ransomware tricking user into allowing OAuth permissions to "Thunderbird with ExQuilla" for O365}}, date = {2021-08-05}, organization = {Twitter (@AltShiftPrtScn)}, url = {https://twitter.com/AltShiftPrtScn/status/1423190900516302860?s=20}, language = {English}, urldate = {2021-08-06} } Tweet on Lorenz ransomware tricking user into allowing OAuth permissions to "Thunderbird with ExQuilla" for O365
Lorenz
2021-06-29The RecordCatalin Cimpanu
@online{cimpanu:20210629:free:228fc3b, author = {Catalin Cimpanu}, title = {{Free decrypter available for Lorenz ransomware}}, date = {2021-06-29}, organization = {The Record}, url = {https://therecord.media/free-decrypter-available-for-lorenz-ransomware/}, language = {English}, urldate = {2021-06-30} } Free decrypter available for Lorenz ransomware
Lorenz
2021-06-25TesorionGijs Rijnders
@online{rijnders:20210625:lorenz:78cf649, author = {Gijs Rijnders}, title = {{Lorenz ransomware: analysis and a free decryptor}}, date = {2021-06-25}, organization = {Tesorion}, url = {https://www.tesorion.nl/en/posts/lorenz-ransomware-analysis-and-a-free-decryptor/}, language = {English}, urldate = {2021-06-29} } Lorenz ransomware: analysis and a free decryptor
Lorenz
2021-05-13Bleeping ComputerLawrence Abrams
@online{abrams:20210513:meet:7ffacf5, author = {Lawrence Abrams}, title = {{Meet Lorenz — A new ransomware gang targeting the enterprise}}, date = {2021-05-13}, organization = {Bleeping Computer}, url = {https://www.bleepingcomputer.com/news/security/meet-lorenz-a-new-ransomware-gang-targeting-the-enterprise/}, language = {English}, urldate = {2021-05-13} } Meet Lorenz — A new ransomware gang targeting the enterprise
Lorenz
Yara Rules
[TLP:WHITE] win_lorenz_auto (20230407 | Detects win.lorenz.)
rule win_lorenz_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2023-03-28"
        version = "1"
        description = "Detects win.lorenz."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.lorenz"
        malpedia_rule_date = "20230328"
        malpedia_hash = "9d2d75cef573c1c2d861f5197df8f563b05a305d"
        malpedia_version = "20230407"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { c745fc01000000 8b4de8 51 8b4de8 e8???????? 50 8d4dd8 }
            // n = 7, score = 300
            //   c745fc01000000       | mov                 dword ptr [ebp - 4], 1
            //   8b4de8               | mov                 ecx, dword ptr [ebp - 0x18]
            //   51                   | push                ecx
            //   8b4de8               | mov                 ecx, dword ptr [ebp - 0x18]
            //   e8????????           |                     
            //   50                   | push                eax
            //   8d4dd8               | lea                 ecx, [ebp - 0x28]

        $sequence_1 = { e8???????? 8b4df0 8b11 8b4224 8945e4 8b4de4 e8???????? }
            // n = 7, score = 300
            //   e8????????           |                     
            //   8b4df0               | mov                 ecx, dword ptr [ebp - 0x10]
            //   8b11                 | mov                 edx, dword ptr [ecx]
            //   8b4224               | mov                 eax, dword ptr [edx + 0x24]
            //   8945e4               | mov                 dword ptr [ebp - 0x1c], eax
            //   8b4de4               | mov                 ecx, dword ptr [ebp - 0x1c]
            //   e8????????           |                     

        $sequence_2 = { 6b4dec28 8b55f0 8b4248 8b4c0820 894de0 8b55e0 8955e8 }
            // n = 7, score = 300
            //   6b4dec28             | imul                ecx, dword ptr [ebp - 0x14], 0x28
            //   8b55f0               | mov                 edx, dword ptr [ebp - 0x10]
            //   8b4248               | mov                 eax, dword ptr [edx + 0x48]
            //   8b4c0820             | mov                 ecx, dword ptr [eax + ecx + 0x20]
            //   894de0               | mov                 dword ptr [ebp - 0x20], ecx
            //   8b55e0               | mov                 edx, dword ptr [ebp - 0x20]
            //   8955e8               | mov                 dword ptr [ebp - 0x18], edx

        $sequence_3 = { 8b55e8 8b0491 8b4df8 8b515c 8b4de4 8b148a 8b4004 }
            // n = 7, score = 300
            //   8b55e8               | mov                 edx, dword ptr [ebp - 0x18]
            //   8b0491               | mov                 eax, dword ptr [ecx + edx*4]
            //   8b4df8               | mov                 ecx, dword ptr [ebp - 8]
            //   8b515c               | mov                 edx, dword ptr [ecx + 0x5c]
            //   8b4de4               | mov                 ecx, dword ptr [ebp - 0x1c]
            //   8b148a               | mov                 edx, dword ptr [edx + ecx*4]
            //   8b4004               | mov                 eax, dword ptr [eax + 4]

        $sequence_4 = { e8???????? 68???????? 8d55e8 52 e8???????? 8b4dfc e8???????? }
            // n = 7, score = 300
            //   e8????????           |                     
            //   68????????           |                     
            //   8d55e8               | lea                 edx, [ebp - 0x18]
            //   52                   | push                edx
            //   e8????????           |                     
            //   8b4dfc               | mov                 ecx, dword ptr [ebp - 4]
            //   e8????????           |                     

        $sequence_5 = { 8d8d54ffffff e9???????? 8d4db8 e9???????? 8b542408 8d420c 8b8a28ffffff }
            // n = 7, score = 300
            //   8d8d54ffffff         | lea                 ecx, [ebp - 0xac]
            //   e9????????           |                     
            //   8d4db8               | lea                 ecx, [ebp - 0x48]
            //   e9????????           |                     
            //   8b542408             | mov                 edx, dword ptr [esp + 8]
            //   8d420c               | lea                 eax, [edx + 0xc]
            //   8b8a28ffffff         | mov                 ecx, dword ptr [edx - 0xd8]

        $sequence_6 = { 8b4dfc e8???????? 8b45fc c700???????? 8b4dfc 83c104 51 }
            // n = 7, score = 300
            //   8b4dfc               | mov                 ecx, dword ptr [ebp - 4]
            //   e8????????           |                     
            //   8b45fc               | mov                 eax, dword ptr [ebp - 4]
            //   c700????????         |                     
            //   8b4dfc               | mov                 ecx, dword ptr [ebp - 4]
            //   83c104               | add                 ecx, 4
            //   51                   | push                ecx

        $sequence_7 = { 51 33c9 8b55ec 8b420c ba04000000 f7e2 0f90c1 }
            // n = 7, score = 300
            //   51                   | push                ecx
            //   33c9                 | xor                 ecx, ecx
            //   8b55ec               | mov                 edx, dword ptr [ebp - 0x14]
            //   8b420c               | mov                 eax, dword ptr [edx + 0xc]
            //   ba04000000           | mov                 edx, 4
            //   f7e2                 | mul                 edx
            //   0f90c1               | seto                cl

        $sequence_8 = { 8965f0 894de4 8b4514 8b08 83e101 7509 8b5514 }
            // n = 7, score = 300
            //   8965f0               | mov                 dword ptr [ebp - 0x10], esp
            //   894de4               | mov                 dword ptr [ebp - 0x1c], ecx
            //   8b4514               | mov                 eax, dword ptr [ebp + 0x14]
            //   8b08                 | mov                 ecx, dword ptr [eax]
            //   83e101               | and                 ecx, 1
            //   7509                 | jne                 0xb
            //   8b5514               | mov                 edx, dword ptr [ebp + 0x14]

        $sequence_9 = { cc 33d2 75c3 33c0 75bf 837dfc00 7408 }
            // n = 7, score = 300
            //   cc                   | int3                
            //   33d2                 | xor                 edx, edx
            //   75c3                 | jne                 0xffffffc5
            //   33c0                 | xor                 eax, eax
            //   75bf                 | jne                 0xffffffc1
            //   837dfc00             | cmp                 dword ptr [ebp - 4], 0
            //   7408                 | je                  0xa

    condition:
        7 of them and filesize < 2254848
}
Download all Yara Rules