General
-
Target
winnt32.exe
-
Size
441KB
-
Sample
210826-gbhbecdts2
-
MD5
bc0b5052b957c3bedff6bb3cb6e0d646
-
SHA1
593a2d83afdf8377207af4b1b20573a2aa83b7bf
-
SHA256
4e33391000cf4732b82569f2ff0196e3cfee10a67b7dcaf52070ac7e2f79826e
-
SHA512
fc7ea750aa4b886b01aaa41dfacc69ea6082913965af0dff68cdbf4430b79aa584d057369680d3e7ee5f0cb41cd16d50ef6418bcf5ec5adf4c7fb2d7acb6ac20
Static task
static1
Behavioral task
behavioral1
Sample
winnt32.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
winnt32.exe
Resource
win10v20210410
Malware Config
Extracted
C:\LCRY_README.txt
Targets
-
-
Target
winnt32.exe
-
Size
441KB
-
MD5
bc0b5052b957c3bedff6bb3cb6e0d646
-
SHA1
593a2d83afdf8377207af4b1b20573a2aa83b7bf
-
SHA256
4e33391000cf4732b82569f2ff0196e3cfee10a67b7dcaf52070ac7e2f79826e
-
SHA512
fc7ea750aa4b886b01aaa41dfacc69ea6082913965af0dff68cdbf4430b79aa584d057369680d3e7ee5f0cb41cd16d50ef6418bcf5ec5adf4c7fb2d7acb6ac20
-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-