General

  • Target

    LCrypt0rX.vbs

  • Size

    30KB

  • Sample

    250508-gmseysywgs

  • MD5

    ec14c16e786084d7b22645b22c1e2e2b

  • SHA1

    4d8d49cc6820f3924c4b055481c951e46e53f70a

  • SHA256

    34f4bcd039f22cb5e674f7d4c170a4e7b4f457c92213de1273ac40ae945fd422

  • SHA512

    0c6704407f6a6330e6fc5156bc83e275f74c9734ffc10e6b083f099c2af13c6f4d2cd2f821738ea3b304b380d7daa705899f8bf3a19969e95ac2ccea320c300e

  • SSDEEP

    384:tjfviu3p49gax5F9W4eHCP5SSbAhMgQ5WQ9euIudDy9IkuDjPdONK04MeOaz:Zni421bWQ9JDjCKX

Malware Config

Targets

    • Target

      LCrypt0rX.vbs

    • Size

      30KB

    • MD5

      ec14c16e786084d7b22645b22c1e2e2b

    • SHA1

      4d8d49cc6820f3924c4b055481c951e46e53f70a

    • SHA256

      34f4bcd039f22cb5e674f7d4c170a4e7b4f457c92213de1273ac40ae945fd422

    • SHA512

      0c6704407f6a6330e6fc5156bc83e275f74c9734ffc10e6b083f099c2af13c6f4d2cd2f821738ea3b304b380d7daa705899f8bf3a19969e95ac2ccea320c300e

    • SSDEEP

      384:tjfviu3p49gax5F9W4eHCP5SSbAhMgQ5WQ9euIudDy9IkuDjPdONK04MeOaz:Zni421bWQ9JDjCKX

    • Modifies WinLogon for persistence

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Blocklisted process makes network request

    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Deletes backup catalog

      Uses wbadmin.exe to inhibit system recovery.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Event Triggered Execution: Image File Execution Options Injection

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Indicator Removal: Clear Persistence

      remove IFEO.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v16

Tasks

OSZAR »