LevelBlue Acquires Fortra’s Alert Logic MDR Business, Strengthening Position as Global MDR Leader. Learn More

LevelBlue Acquires Fortra’s Alert Logic MDR Business, Strengthening Position as Global MDR Leader. Learn More

Services
Cyber Advisory
Managed Cloud Security
Data Security
Managed Detection & Response
Email Security
Managed Network Infrastructure Security
Exposure Management
Security Operations Platforms
Incident Readiness & Response
SpiderLabs Threat Intelligence
Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Operational Technology
End-to-end OT security
Microsoft Security
Unlock the full power of Microsoft Security
Securing the IoT Landscape
Test, monitor and secure network objects
Why LevelBlue
About Us
Awards and Accolades
LevelBlue SpiderLabs
PGA of America Partnership
Secure What's Next
LevelBlue Security Operations Platforms
Security Colony
Partners
Microsoft
Unlock the full power of Microsoft Security
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings

19 Shades of LockBit5.0, Inside the Latest Cross-Platform Ransomware: Part 1

This three-part blog series presents an analysis of 19 samples of a cross-platform LockBit 5.0 ransomware payload affecting Windows, Linux (LINUX Locker v1.06/v1.08), and ESXi (LINUX ESXi Locker v1.07) environments, highlighting how the ransomware operates, encrypts data, and interacts with targeted systems. By reverse engineering multiple samples, we identified shared components across platforms as well as operating system–specific behaviors that allow the malware to function efficiently in different environments.

At the core of the threat is the use of a fast encryption method (ChaCha20) to encrypt files and data, replacing the AES-based encryption used in previous versions. The malware is designed for performance and scalability, enabling it to process large volumes of data quickly while avoiding reliance on standard cryptographic libraries, which can make detection more difficult.

This report examines how the malware accesses files, manages system processes, and executes tasks in parallel, giving defenders insight into its operational workflow. While the underlying encryption approach is consistent, the techniques used to interact with Windows and Linux systems differ, reflecting deliberate adaptation to each platform.

At the time of writing, the sample had a detection score of 1/65 on VirusTotal.

Lockbit5_Part1_Pic1
Figure 1. VirusTotal detection results for the LockBit 5.0 sample we analyzed as of writing

 

Threat Landscape

LockBit is one of the clearest examples of ransomware evolving into an industrial business model. It operates as ransomware-as-a-service (RaaS): a core team maintains the malware, negotiation/payment infrastructure, and leak site, while affiliates carry out intrusions and deployments for a revenue share. That division of labor is what lets the operation scale, and why LockBit has repeatedly been described in public reporting as a high-volume, high-impact ecosystem.

Lockbit5_Part1_Pic2
Figure 2. Discussion of development plans and a shared fund on a dark web forum

More recently, LockBit’s posture points to a potentially more serious market shift: consolidation. Reporting in October 2025 described LockBit aligning with other ransomware brands (including DragonForce and Qilin) in a cartel-style approach that emphasizes shared resources and invites additional crews to join. If that umbrella model gains traction, defenders may face not just a single prolific RaaS brand, but an aggregation layer that pools affiliates, infrastructure, and playbooks, raising both the baseline capability and the potential scale of ransomware operations.

In this report, we analyze the latest observed samples of the LockBit 5.0 ransomware family, comparing builds across platforms and architectures to understand what stays consistent, what changes, and what it reveals about the group’s current development direction and operational tradecraft.

 

Part1: ESXi Variant Technical Analysis

Overview

VMware ESXi is a widely adopted bare-metal hypervisor used to host and manage large numbers of virtual machines in enterprise environments. By consolidating critical workloads, such as databases, application servers, and domain controllers, into a single physical host, ESXi enables efficiency and scalability, but it also creates a high-value target. A successful compromise of an ESXi host can result in the simultaneous disruption of dozens or even hundreds of systems.

In recent years, ransomware operators have increasingly shifted their focus from individual endpoints to hypervisors like ESXi. Rather than encrypting files within a single operating system, ESXi-targeting ransomware attacks the underlying virtual disk files and configuration data that power entire virtual infrastructures. This approach maximizes operational impact while reducing the attacker’s effort.

Lockbit5_Part1_Pic3
Figure 3. LockBit Builder Linux version view

Lockbit5_Part1_Pic4
Figure 4. LockBit Builder ESXi version view

 

LockBit 5.0 ESXi Version

Figure 4 illustrates the execution flow of the LockBit 5.0 ESXi ransomware based on static analysis. The malware first validates that it is running in a VMware ESXi environment, then enumerates and forcibly shuts down active virtual machines to release file locks. It proceeds with a multi-threaded encryption routine using a fast pass followed by a full pass on targeted VM files. Instead of dropping a traditional ransom note, victim notification is handled via console output or log files, reflecting the headless nature of ESXi systems.

Lockbit5_Part1_Pic5
Figure 5. LockBit ESXi execution flow

This is a 64-bit Linux ELF executable compiled for the x86-64 architecture. The binary is dynamically linked. The file lacks ELF section headers, a common anti-analysis technique used by malware.

file lockbit_AMD64

lockbit_AMD64: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, no section header

This ldd command output shows the shared libraries required by the LockBit ESXi binary at runtime. libpthread.so.0 indicates the use of threads, supporting multi-threaded execution consistent with parallel encryption activity.

ldd lockbit_AMD64

linux-vdso.so.1 (0x00007f341514f000)
libpthread.so.0 => /lib/x86_64-linux-gnu/libpthread.so.0 (0x00007f341512b000)
libc.so.6 => /lib/x86_64-linux-gnu/libc.so.6 (0x00007f3414f35000)
/lib64/ld-linux-x86-64.so.2 (0x00007f3415151000)

A Binwalk scan of the LockBit ESXi sample highlights embedded file paths within the binary.

binwalk lockbit_AMD64

DECIMAL HEXADECIMAL DESCRIPTION
--------------------------------------------------------------------
0 0x0 ELF, 64-bit LSB executable, AMD x86-64, version 1 (SYSV)
362953 0x589C9 Unix path: /var/log/encrypt.log
367904 0x59D20 Unix path: /var/tmp/.guestfs-0/appliance.d/root

The path /var/log/encrypt.log suggests the malware may record encryption activity or status messages to a log file during execution.

The second path, /var/tmp/.guestfs-0/appliance.d/root, appears to reference a temporary directory structure associated with virtual appliance. Its presence indicates the malware may interact with temporary VM-related files

Analysis of embedded strings within the sample provides valuable insight into the ransomware’s functionality, execution flow, and intended interaction with the ESXi environment.

Embedded versioning within the binary:

LINUX Locker v1.07
LOCKBIT5.0

The extracted strings clearly show that this ransomware is specifically designed to target VMware ESXi environments. References to /vmfs and /vmfs/volumes/ indicate an intent to access VMFS datastores where virtual machine disk files reside, while embedded vim-cmd commands such as vmsvc/getallvms, vmsvc/power.off, and vmsvc/power.getstate demonstrate built-in functionality to enumerate, check the status of, and forcibly shut down virtual machines before encryption. Additional environment-validation strings like ESXi 4, ESXi x64, and vmware -v suggest the malware verifies it is executing on a legitimate ESXi host, helping avoid accidental deployment on non-target systems or analysis environments.

Status messages such as “[OK] VM %s (ID: %d) powered off.” indicate that the ransomware tracks and confirms successful shutdown of individual virtual machines.

# ESXi Specific indicators:
/vmfs
/vmfs/volumes/
/bin/vim-cmd vmsvc/getallvms - enumeration
/bin/vim-cmd vmsvc/power.off %d - poweroff
/bin/vim-cmd vmsvc/power.getstate %d
ESXi 4
ESXi x64
vmware -v

Meanwhile, “[INFO] VM %s (ID: %d) in bypass list, skipping” suggests the presence of an internal exclusion list that prevents certain VMs from being targeted. The command fragment ps | grep vmx | grep "%s" further supports this workflow, showing that the malware searches running processes for VMware VMX instances associated with specific virtual machines.

VM Logic:
[OK] VM %s (ID: %d) powered off.
[INFO] VM %s (ID: %d) in bypass list, skipping
ps | grep vmx | grep "%s"

Options such as -f (fast mode), -d (target specific directories), -l (enable logging), and -b (background execution) provide operational flexibility, while -m (note storage mode) and -k (disable self-destruction) indicate adjustable post-encryption behaviors.

Dedicated to hunting and eradicating the world's most challenging threats.

SpiderLabs

Additional flags directly influence the encryption process: -r controls the percentage of each file to encrypt, -w enables wiping of free disk space, -t sets a delayed start, -o disables automatic VM termination, and -n allows specific virtual machines to be excluded by ID. Supporting status messages such as “Fast mode enabled (1% encryption)” and “Fast pass completed. Starting full encryption pass”, along with the marker .vmdk.fastpass, confirm a two-stage encryption strategy in which a rapid partial pass is followed by more thorough encryption.

Parameters:
-f Fast mode (1% encryption)
-d Specific directories to encrypt
-l Enable logging
-b Background mode
-m Note storage mode (0,1,2)
-k Do not self-destruct

Encryption:
-r Encryption percentage (10–90)
-w Wipe free disk space
-t Timeout before starting
-o Don't try to automatically kill VMs
-n Skip VMs by ID

Fast mode enabled (1% encryption)
Fast pass completed. Starting full encryption pass
.vmdk.fastpass

The list of targeted file extensions clearly shows that the ransomware is engineered to disrupt virtual machine infrastructure at the hypervisor level. Files such as .vmdk (virtual disk files) and .vmx (VM configuration files) are essential for virtual machine operation, while supporting files like vswp (swap files), vmem (memory snapshots), and vmsn (snapshot state files) are also included to ensure full impact. Additional metadata and state files: vmsd, vmtx, vmss, vmxf, and nvram, further indicate an intent to corrupt both runtime and configuration data.

# Targeted Files:
.vmdk
.vmx
vswp
vmem
vmsn
vmsd
vmtx
vmss
vmxf
nvram

The reference to /var/log/encrypt.log along with the message “[INFO] Logging enabled” suggests the malware can record its activity to a local log file, likely to provide operators with execution feedback in ESXi’s command-line driven environment. Additionally, messages such as “[INFO] Binary removed successfully.” and “[ERROR] Failed to remove binary.” reveal a built-in self-deletion routine intended to remove the executable after deployment.

Logging:
/var/log/encrypt.log
[INFO] Logging enabled
Self delete:
[INFO] Binary removed successfully.
[ERROR] Failed to remove binary.

References to /proc/self/maps and /proc/self/status, along with the field TracerPid:, indicate that the malware inspects its own process status to determine whether it is being debugged or traced. Mentions of tools such as valgrind, frida, strace, and ltrace show that it actively looks for common dynamic analysis and instrumentation frameworks. Additionally, the presence of asan, tsan, msan, and ubsan, components of compilers used in debugging and research environments, suggests further checks designed to avoid execution under memory analysis.

Anti Analysis and Anti Sandbox:
/proc/self/maps
TracerPid:
/proc/self/status
valgrind
frida
strace
ltrace
asan
tsan
msan
ubsan

Directories such as /proc, /dev, and /sys contain virtual- and device-related files essential for kernel and hardware interaction, while /bootbank and /altbootbank store ESXi boot images and recovery partitions. Core system locations like /etc, /lib, and /bin are also excluded, preventing corruption of configuration files and essential binaries. By excluding these paths, the malware ensures the host remains bootable and reachable, allowing victims to access the system and potentially pay the ransom.

Exclutions (avoid breaking the hypervisor):
/proc
/dev
/sys
/bootbank
/altbootbank
/etc
/lib
/bin

String analysis revealed extensive ESXi-specific functionality within the sample, including native interaction with VMware management utilities (vim-cmd), VM enumeration and shutdown logic, and targeted encryption of VM disk and configuration artifacts. The binary exposes a comprehensive command-line interface allowing operators to control encryption scope, percentage, execution mode, logging behavior, and VM exclusions, consistent with LockBit’s affiliate-driven ransomware-as-a-service model. Additional features include fast-pass partial encryption, optional free-space wiping, self-deletion, and multiple anti-analysis checks targeting debugging and instrumentation frameworks.

 

Control Flow And Core Routines

To make sure the ransomware is running on the ESXi host, it first performs an OS check via execution the following command:

Lockbit5_Part1_Pic6

The command vmware -v 2> /dev/null is used to quietly check whether the system is running VMware by querying the version information while suppressing any error messages, allowing the malware to detect an ESXi environment without producing visible output.

Lockbit5_Part1_Pic7

The command ps | grep vmx | grep "%s" | grep -v grep | awk '{print $2}' | sort -u is used to locate running VMware virtual machine processes that match a specific identifier, extract their process IDs, and produce a unique list, likely so the malware can terminate active VMs before encryption.

Lockbit5_Part1_Pic8

Virtual machine shutdown routine, where the malware checks a VM’s power state and, if still running, repeatedly issues a vim-cmd vmsvc/power.off command while verifying the result, confirming an automated loop designed to ensure VMs are fully powered off before encryption begins.

Lockbit5_Part1_Pic9

Command-line options such as fast encryption mode, background execution, quiet mode, note storage behavior, self-destruction control, free space wiping, and custom encryption percentage, indicating a highly configurable execution flow.

Lockbit5_Part1_Pic10

The ransomware maintains real-time operational metrics, likely to provide operators with progress visibility and to verify that the encryption process completed successfully across the targeted environment.

 

Encryption

ChaCha20 stream cipher implementation:

Lockbit5_Part1_Pic11

 

Hex Values Decode to ASCII

Lockbit5_Part1_Pic12

Reordered in memory (little-endian), this value spells “expand 32-byte k”, which is the ChaCha20 constant string that is used to initialize the state.

 

ESXi I386 Variant Analysis

The analyzed sample is a 32-bit Linux ELF (i386) associated with VMware ESXi targeting and has been observed labeled as “LINUX Locker v1.06”, that may indicate an unchanged build from a prior release or a version counter oversight by the operator. While it can execute on a generic Linux host that provides the required 32-bit runtime or loader, its orchestration is clearly optimized for ESXi: the operational flow is equivalent to that observed in previous x64 ESXi sample. It assumes datastore discovery and traversal under /vmfs/volumes/… and integrates VMware management tooling (e.g., vim-cmd) for VM enumeration and power-state handling, meaning ESXi-dependent stages may fail or be bypassed on non-ESXi Linux unless paths are supplied manually.

Lockbit5_Part1_Pic13
The sample of decompiled code illustrating Poly1305 operations

From an analysis perspective, the binary is stripped and notably omits the section header table, reducing the effectiveness of common automated triage and section-driven reversing workflows. The implementation also indicates concurrent processing via threading and TLS state, and it encodes auxiliary strings and operational parameters behind a runtime string obfuscation layer where high-value text (paths, command templates, and messages) is decoded on demand using a rotate-based transform. Functionally, the codebase includes a modern cryptographic stack ChaCha-family present.

In the next parts of this series, we will cover the Linux and Windows variants.

ABOUT LEVELBLUE

LevelBlue is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.

Latest Intelligence

Discover how our specialists can tailor a security program to fit the needs of
your organization.

Request a Demo