General

  • Target

    LCrypt0rX.vbs

  • Size

    21KB

  • Sample

    241031-j2nfnavdlp

  • MD5

    e1f2ed36b5a3420eeb51d4b3dca147a6

  • SHA1

    f16917a4f615b931db0944f9f79f35dda59dada3

  • SHA256

    1c929430c2d1015df584d1b885c492cefab2bd46b2d90fc36d6af94950aa1543

  • SHA512

    c7ee39674ac88d3e7e412405412f4edffc9ff5e22f3181880d04e7b7746273a0eed24b8f46c57b601d7ddce39f85e682ff32d073769a920fb1ec136979f3526b

  • SSDEEP

    384:t0GbplStxYHQHSH7l+ikHVn27vXQayXwA+sxQ+E6O:LCR2YY+EF

Malware Config

Targets

    • Target

      LCrypt0rX.vbs

    • Size

      21KB

    • MD5

      e1f2ed36b5a3420eeb51d4b3dca147a6

    • SHA1

      f16917a4f615b931db0944f9f79f35dda59dada3

    • SHA256

      1c929430c2d1015df584d1b885c492cefab2bd46b2d90fc36d6af94950aa1543

    • SHA512

      c7ee39674ac88d3e7e412405412f4edffc9ff5e22f3181880d04e7b7746273a0eed24b8f46c57b601d7ddce39f85e682ff32d073769a920fb1ec136979f3526b

    • SSDEEP

      384:t0GbplStxYHQHSH7l+ikHVn27vXQayXwA+sxQ+E6O:LCR2YY+EF

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Blocklisted process makes network request

    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Deletes backup catalog

      Uses wbadmin.exe to inhibit system recovery.

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks