The Curious Case of PlayBoy Locker

Cybereason issues Threat Analysis reports to investigate emerging threats and provide practical recommendations for protecting against them. In this Threat Analysis report, Cybereason investigates the new Ransomware-as-a-Service (RaaS) known as PlayBoy Locker and how to defend against it through the Cybereason Defense Platform.

KEY POINTS

  • Access to Sophisticated Attack Kits for Less-Skilled Attackers: PlayBoy Locker Ransomware-as-a-Service (RaaS) platform allows relatively unskilled cybercriminals to launch ransomware attacks by providing a comprehensive toolkit, including ransomware payloads, management dashboards, and support services. Many dark web RaaS providers operate on an affiliate model, sharing profits with affiliates who spread the malware, which makes ransomware accessible to a broader range of attackers who lack the technical skills to develop it themselves.  
  • Binary Customizations: The PlayBoy Locker RaaS platform offers affiliates numerous options for building ransomware binaries that target Windows, NAS, and ESXi systems, enabling tailored configurations to suit different operational requirements.
  • Frequent Updates and Customer Support for Affiliates: PlayBoy Locker RaaS operators advertise regular updates, anti-detection features, and even customer support for affiliates. Through dark web forums, RaaS developers may offer troubleshooting support, guidance on maximizing infection rates, and updates to evade antivirus and endpoint detection tools. This support infrastructure creates a more professionalized ecosystem, further increasing the threat level of ransomware attacks by enabling frequent innovation and more complex attack strategies.

INTRODUCTION

The PlayBoy Locker group has been active since September 2024. Their initial post on a darknet forum was a request for beta testers to try out their new locker.

request for beta testers 1

Request for beta testers to try out new locker functionality

PlayBoy Locker affiliate program was presented in the dark web forum, where affiliates agree to share a percentage of ransom payments with the PlayBoy Locker service operator by splitting the revenue 85/15%.

playboy affiliate

PlayBoy Affiliate program presentation On The Russian Anonymous Marketplace

playboy affiliate 2PlayBoy Affiliate program presentation On The Russian Anonymous Marketplace

PlayBoy Locker also created an onion site, and added the first victim.

onion

Then, out of the blue, they shared a sales pitch on the dark web, trying to sell their project, shutting down the project.

selling project1 selling project 2PlayBoy Locker unexpectedly selling their project

TECHNICAL ANALYSIS

PlayBoy Locker Operating System Support – Windows

The current known Windows versions of PlayBoy Locker demonstrate the following capabilities:

  • Combination of hc-128 and curve25519 encryption algorithms.
  • Written in the C++ programming language
windows binary
PlayBoy Locker Windows Binary
  • Segmented file encryption
  • Automatic worm in AD via LDAP with provided AD credentials
  • Multithreaded queue for encryption
  • Processes/Services termination
  • Shadow copy delete
  • Restart-System
  • Change Wallpaper
  • Running One locker process at a time
  • Wipe Free Space
  • Customizable ransom note
  • Empty Bin

 

Additional Support – NAS And ESXi

The PlayBoy Locker version has the following capabilities:

capabilities

For the ESXi version, it has the following capabilities:

  • Automatic VM’s shut down
  • Run as a daemon
  • Exclude files/paths
  • Build size 70 kb

For the NAS version (Network-attached storage), it can do:

  • Simple single path encryption

Screenshots are provided showing this can be fully automated from a web-based builder:

web based builder

Screenshots also show active chats panel and administration panels:

admin panels

admin panel2PlayBoy Locker Admin Panel

Binary Analysis

Like most ransomware, the initial compromise often occurs through various infection vectors, such as phishing emails, or compromised remote desktop protocol (RDP) endpoints.

In this section, Cybereason describes the analysis of a sample of the ransomware binary that is supposed to be executed on the victim machines.

LDAP Scan

The Lightweight Directory Access Protocol (LDAP) is a vendor-neutral application protocol used for accessing and maintaining distributed directory information services over an IP network. It is commonly used to query and manage directory services, such as Microsoft Active Directory, but is not limited to Windows environments.

PlayBoy Locker performs LDAP scans to automatically search for machines available in the network and then try to copy ransomware executable to the remote device. The ransomware will then set up a Windows service from a remote location to run the executable.

In order to perform LDAP scan, parameters -ip , -u (user name), -p (password) are required.

LDAP queryLDAP Query Search for Available Machines in the network 

active directory domain

Remote Service Strings

RstrtMgr DLL Loading (Restart Manager)

RstrtMgr.dll, the Restart Manager, is a critical system component that safeguards open and unsaved files during system reboots. It acts as a gatekeeper, prompting users to save their work before shutting down to prevent data loss. PlayBoy Locker exploits this DLL in a malicious way.

Before encrypting a file, the ransomware stops services and processes in order to unlock and safely close open files.

regopen key

The list of processes and services targeted by PlayBoy Locker is as following:

List of services and processes targeted by PlayBoy Locker

Telegram.exe

encsvc.exe

powerpnt.exe

msexchange

Skype.exe

firefox.exe

steam.exe

sophos

Chrome.exe

tbirdconfig.exe

thebat.exe

veeam

sql.exe

mydesktopqos.exe

thunderbird.exe

backup

Oracle.exe

ocomm.exe

visio.exe

GxVss

ocssd.exe

dbeng50.exe

winword.exe

GxBlr

dbsnmp.exe

sqbcoreservice.exe

wordpad.exe

GxFWD

synctime.exe

excel.exe

notepad.exe

GxCVD

agntsvc.exe

infopath.exe

calc.exe

GxCIMgr

isqlplsussvc.exe

msaccess.exe

wuauclt.exe

 

xfssvccon.exe

mspub.exe

svc$

 

mydesktopservice.exe

onenote.exe

memtas

 

ocautoupds.exe

outlook.exe

mepocs

 

 

Shadow Copy Deletion

Deleting shadow copies is typical from ransomware in order to avoid their victim to restore their data through Windows snapshots.When Shadow Copy delete process is initiated by PlayBoy Locker, it calls the “vssadmin delete shadows /all /quiet”

shadow copies

PlayBoy Locker Shadow Copies delete attempt

File Encryption

Ransomware often employs multithreading to accelerate file encryption. This technique involves the parent thread identifying and sending files for encryption to child threads.

multiple threads

Multiple threads can be seen from this dynamic analysis screenshot

The child threads then work concurrently, each encrypting a different file, significantly speeding up the overall encryption process. This approach leverages the system's hardware capabilities to encrypt files more efficiently.

PlayBoy Locker uses strong encryption methods to lock down files on all connected devices in a network. It targets a variety of file formats, such as documents, pictures, videos, and databases.

Once files are encrypted, victims can't access them unless they have the decryption key, which is controlled by the attackers.pdf file encryption

PDF File Encryption Process Example

encrypted filesEncrypted Files

Ransom Note

The ransom note thread extracts and decodes the embedded ransom note, which was specified in the malware's settings. This note is then saved as a "INSTRUCTIONS.txt" file in every directory that isn't explicitly excluded from encryption.

creation of ransom noteCreation Of The Ransom Note INSTRUCTIONS.txt

instructionsRansom Note

Self Deletion

Once the ransomware completes its operations, it tries to remove itself using the following command:

C:\Windows\System32\cmd.exe /C ping 127.0.0.1 -n 2 >nul del /F file name

IOCs

Cybereason shared a list of indicators of compromise related to this research :

IOC

IOC type

Description

3030a048f05146b85c458bcabe97968e5efdd81b224b96c30c83b74365839e7b

SHA-256

PlayBoy Locker Windows Encryptor

a9e1bd8f9cbeeec64da558027f380195f7ed572f03830a890dd0494e64d98556

SHA-256

PlayBoy Locker Windows Encryptor

a9e1bd8f9cbeeec64da558027f380195f7ed572f03830a890dd0494e64d98556

SHA-256

PlayBoy Locker Windows Encryptor

 

Cybereason Recommendations:

Cybereason proposes the following recommendations to help detecting and preventing PlayBoy Locker execution attempts:

  • Follow and hunt PlayBoy Locker affiliate activity in order to identify pre-ransomware behaviors
  • Promote cybersecurity best practices such as multifactor authentication and patch management.
  • Regularly backup files and create a backup process and policy : Restoring your files from a backup is the fastest way to regain access to your data
  • Keep systems fully patched: Make sure your systems are patched in order to mitigate vulnerabilities
  • Involve Incident Response services to execute a thorough investigation and containment process in order to fully eliminate the threat actor from the infected network
  • For Cybereason customers on the Cybereason Defense Platform:
    • Enable Anti-Malware and set the Anti-Malware > Signatures mode to Prevent, Quarantine, or Disinfect
    • Enable Anti-Ransomware (PRP), set Anti-Ransomware to Quarantine mode and enable shadow copy protection. Enable Application Control
    • Enable Variant Payload Prevention with prevent mode on Cybereason Behavioral execution prevention.

MITRE ATT&CK MAPPING

Tactic

Techniques / Sub-Techniques

TA0002: Execution

T1047 – Windows Management Instrumentation

TA0002: Execution

T1106 - Native API

TA0003: Persistence

T1543.003 – Create or Modify System Process: Windows Service

TA0007: Discovery 

T1083 - File and Directory Discovery

TA0004: Privilege Escalation

T1078.001 – Valid Accounts: Default Accounts

TA0004: Privilege Escalation

T1078.002 – Valid Accounts: Domain Accounts

TA0007: Discovery 

T1135 - Network Share Discovery

TA0007: Discovery 

T1016 - System Network Configuration Discovery

TA0005: Defense Evasion

T1406.002 – Obfuscated Files or Information: Software Packing

TA0005: Defense Evasion

T1620 - Reflective Code Loading

TA0009: Collection

T1119 – Automated Collection

TA0040: Impact

T1486 - Data Encrypted for Impact

TA0040: Impact

T1489 – Service Stop

TA0040: Impact

T1490 – Inhibit System Recovery

 

ABOUT THE RESEARCHER

Mark Tsipershtein, Security Researcher, Cybereason
mark-tsipershtein-hs

Mark Tsipershtein, a security researcher at the Cybereason Security Research Team, focuses on research, analysis automation and infrastructure. Mark has more than 20 years of experience in SQA, automation, and security research.

Cybereason Security Services Team
About the Author

Cybereason Security Services Team

All Posts by Cybereason Security Services Team