According to researchers from ThreatDown and Thales Group , the password-protected archive typically contains four critical files that simplify the ransomware creation process:

: A modifiable configuration file that allows the attacker to customize ransom notes, target specific file extensions, and set command-and-control (C2) details.

: A batch file that automates the compilation of the ransomware binaries. Technical Capabilities

Malware analysis Lockbit 3 Builder.7z Malicious activity - ANY.RUN

: The core executable used to compile the final ransomware payload.

The builder was leaked online in after a disgruntled developer reportedly stole the code from the LockBit ransomware-as-a-service (RaaS) group. It was initially shared via Twitter accounts like @ali_qushji and @protonleaks , and the code has since been mirrored on platforms like GitHub .