Overview
overview
10Static
static
3LCRYPT0R/L...D).vbs
windows7-x64
9LCRYPT0R/L...D).vbs
windows10-2004-x64
1LCRYPT0R/L...D).vbs
windows11-21h2-x64
1LCRYPT0R/L...rX.vbs
windows7-x64
9LCRYPT0R/L...rX.vbs
windows10-2004-x64
9LCRYPT0R/L...rX.vbs
windows11-21h2-x64
9other malw...0r.exe
windows7-x64
10other malw...0r.exe
windows10-2004-x64
10other malw...0r.exe
windows11-21h2-x64
10other malw...rm.vbs
windows7-x64
1other malw...rm.vbs
windows10-2004-x64
1other malw...rm.vbs
windows11-21h2-x64
1Static task
static1
Behavioral task
behavioral1
Sample
LCRYPT0R/LCRYPT (OBFUSCATED).vbs
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
LCRYPT0R/LCRYPT (OBFUSCATED).vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
LCRYPT0R/LCRYPT (OBFUSCATED).vbs
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
LCRYPT0R/LCrypt0rX.vbs
Resource
win7-20240708-en
Behavioral task
behavioral5
Sample
LCRYPT0R/LCrypt0rX.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
LCRYPT0R/LCrypt0rX.vbs
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
other malware cuz why not/[email protected]
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
other malware cuz why not/[email protected]
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
other malware cuz why not/[email protected]
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
other malware cuz why not/loveletterworm.vbs
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
other malware cuz why not/loveletterworm.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral12
Sample
other malware cuz why not/loveletterworm.vbs
Resource
win11-20241007-en
General
-
Target
LCrypt0rX.zip
-
Size
3.4MB
-
MD5
6de83dbc46dc4727c0d0bca96a58dc08
-
SHA1
32c2d4ba4481feb63b9ffe462580d5f8ef8a9c7d
-
SHA256
becd2c45fe7bf8eedc702223d6be3484b2c2bc38277ecba16c74e18ab2572846
-
SHA512
d863dc494026ccc5f524e71fcc5e494fdf6eb1ef75d58a33a25f3b63ec526c2840b193b0a3c895fd88f185635db347d8f2bd25d0bcb8c6b0b345fabd4afef5aa
-
SSDEEP
98304:8enlgpfEEiHDmEuFXtcmkHpvACxt7JUxp2L/fOU3:fK+EYmMdJYQlUz0Hf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/other malware cuz why not/[email protected]
Files
-
LCrypt0rX.zip.zip
Password: VBSFileEncrypt
-
LCRYPT0R/LCRYPT (OBFUSCATED).vbs
-
LCRYPT0R/LCrypt0rX.vbs.vbs
-
LCRYPT0R/PASSWORD_VBSFileEncrypt
-
PLEASE READ ME.txt
-
other malware cuz why not/[email protected].exe windows:4 windows x86 arch:x86
Password: VBSFileEncrypt
68f013d7437aa653a8a98a05807afeb1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesW
GetFileSizeEx
CreateFileA
InitializeCriticalSection
DeleteCriticalSection
ReadFile
GetFileSize
WriteFile
LeaveCriticalSection
EnterCriticalSection
SetFileAttributesW
SetCurrentDirectoryW
CreateDirectoryW
GetTempPathW
GetWindowsDirectoryW
GetFileAttributesA
SizeofResource
LockResource
LoadResource
MultiByteToWideChar
Sleep
OpenMutexA
GetFullPathNameA
CopyFileA
GetModuleFileNameA
VirtualAlloc
VirtualFree
FreeLibrary
HeapAlloc
GetProcessHeap
GetModuleHandleA
SetLastError
VirtualProtect
IsBadReadPtr
HeapFree
SystemTimeToFileTime
LocalFileTimeToFileTime
CreateDirectoryA
GetStartupInfoA
SetFilePointer
SetFileTime
GetComputerNameW
GetCurrentDirectoryA
SetCurrentDirectoryA
GlobalAlloc
LoadLibraryA
GetProcAddress
GlobalFree
CreateProcessA
CloseHandle
WaitForSingleObject
TerminateProcess
GetExitCodeProcess
FindResourceA
user32
wsprintfA
advapi32
CreateServiceA
OpenServiceA
StartServiceA
CloseServiceHandle
CryptReleaseContext
RegCreateKeyW
RegSetValueExA
RegQueryValueExA
RegCloseKey
OpenSCManagerA
msvcrt
realloc
fclose
fwrite
fread
fopen
sprintf
rand
srand
strcpy
memset
strlen
wcscat
wcslen
__CxxFrameHandler
??3@YAXPAX@Z
memcmp
_except_handler3
_local_unwind2
wcsrchr
swprintf
??2@YAPAXI@Z
memcpy
strcmp
strrchr
__p___argv
__p___argc
_stricmp
free
malloc
??0exception@@QAE@ABV0@@Z
??1exception@@UAE@XZ
??0exception@@QAE@ABQBD@Z
_CxxThrowException
calloc
strcat
_mbsstr
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
Sections
.text Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3.3MB - Virtual size: 3.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
other malware cuz why not/loveletterworm.vbs.vbs