Contact us Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks

YARA Rule: lockbit2.yar

Group:
Valid Rule

/*
LockBit 2.0 ransomware
*/

rule LockBit2_Ransomnote
{
    meta:
        author = "ransomware.live"
        family = "ransomware.lockbit2"
        description = "Detects LockBit 2.0 ransom note"
        date = "2026-05-04"
        severity = 7
        score = 70

    strings:
        $s1 = "LockBit 2.0" ascii nocase
        $s2 = "Restore-My-Files.txt" ascii nocase
        $s3 = ".lockbit" ascii

    condition:
        2 of them
}

rule LockBit2_PE
{
    meta:
        author = "ransomware.live"
        family = "ransomware.lockbit2"
        description = "Detects LockBit 2.0 ransomware executable"
        date = "2026-05-04"
        severity = 9
        score = 90

    strings:
        $s1 = "lockbit2" ascii nocase wide
        $s2 = "LockBit_2_0" ascii wide
        $s3 = "\x00--safe\x00" ascii
        $s4 = "\x00--kill\x00" ascii

    condition:
        uint16(0) == 0x5A4D and 2 of them
}

rule LockBit2_Wallpaper
{
    meta:
        author = "ransomware.live"
        family = "ransomware.lockbit2"
        description = "Detects LockBit 2.0 desktop wallpaper BMP"
        date = "2026-05-04"
        severity = 7
        score = 70

    strings:
        $s1 = "LockBit 2.0" ascii nocase
        $s2 = "RESTORE-MY-FILES.TXT" ascii nocase

    condition:
        uint16(0) == 0x4D42 and any of them
}