General
-
Target
LCrypt0rX.vbs
-
Size
30KB
-
Sample
250508-gmseysywgs
-
MD5
ec14c16e786084d7b22645b22c1e2e2b
-
SHA1
4d8d49cc6820f3924c4b055481c951e46e53f70a
-
SHA256
34f4bcd039f22cb5e674f7d4c170a4e7b4f457c92213de1273ac40ae945fd422
-
SHA512
0c6704407f6a6330e6fc5156bc83e275f74c9734ffc10e6b083f099c2af13c6f4d2cd2f821738ea3b304b380d7daa705899f8bf3a19969e95ac2ccea320c300e
-
SSDEEP
384:tjfviu3p49gax5F9W4eHCP5SSbAhMgQ5WQ9euIudDy9IkuDjPdONK04MeOaz:Zni421bWQ9JDjCKX
Static task
static1
Behavioral task
behavioral1
Sample
LCrypt0rX.vbs
Resource
win10v2004-20250502-en
Behavioral task
behavioral2
Sample
LCrypt0rX.vbs
Resource
win11-20250502-en
Malware Config
Targets
-
-
Target
LCrypt0rX.vbs
-
Size
30KB
-
MD5
ec14c16e786084d7b22645b22c1e2e2b
-
SHA1
4d8d49cc6820f3924c4b055481c951e46e53f70a
-
SHA256
34f4bcd039f22cb5e674f7d4c170a4e7b4f457c92213de1273ac40ae945fd422
-
SHA512
0c6704407f6a6330e6fc5156bc83e275f74c9734ffc10e6b083f099c2af13c6f4d2cd2f821738ea3b304b380d7daa705899f8bf3a19969e95ac2ccea320c300e
-
SSDEEP
384:tjfviu3p49gax5F9W4eHCP5SSbAhMgQ5WQ9euIudDy9IkuDjPdONK04MeOaz:Zni421bWQ9JDjCKX
-
Modifies WinLogon for persistence
-
UAC bypass
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Blocklisted process makes network request
-
Blocks application from running via registry modification
Adds application to list of disallowed applications.
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory
-
Event Triggered Execution: Image File Execution Options Injection
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v16
Execution
Command and Scripting Interpreter
2PowerShell
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Indicator Removal
4Clear Persistence
1File Deletion
3Modify Registry
4