According to researchers from ThreatDown and Thales Group , the password-protected archive typically contains four critical files that simplify the ransomware creation process:
: A modifiable configuration file that allows the attacker to customize ransom notes, target specific file extensions, and set command-and-control (C2) details.
: A batch file that automates the compilation of the ransomware binaries. Technical Capabilities
Malware analysis Lockbit 3 Builder.7z Malicious activity - ANY.RUN
: The core executable used to compile the final ransomware payload.
The builder was leaked online in after a disgruntled developer reportedly stole the code from the LockBit ransomware-as-a-service (RaaS) group. It was initially shared via Twitter accounts like @ali_qushji and @protonleaks , and the code has since been mirrored on platforms like GitHub .