General
-
Target
LCrypt0rX.vbs
-
Size
32KB
-
Sample
250519-na59lsfk3v
-
MD5
9dcad976bf8ad5f2241f08194d332380
-
SHA1
496bfa3ebe716d4f8206a1bb98d84cd38fa783d5
-
SHA256
d6118a0bbfd98bd76e6f953f4f36f394f57feb26b1f5684d327702bdb072ed29
-
SHA512
cc2953730143770b402924ce5d80b9aecc33dcdd75019abfbcf597c68822409bdb622d041ff66a7e1ab819a63d4bad180435c07ba5a8214ece4ed2df64e955de
-
SSDEEP
384:tjfviu3p49gax5F9W4eHCP5SSbAhM/Q5WQ9Y3HIo3uIudUx9Iq4rDjLggFu6:Zni4218WQ+IoD5oDFu6
Static task
static1
Behavioral task
behavioral1
Sample
LCrypt0rX.vbs
Resource
win10v2004-20250502-en
Malware Config
Targets
-
-
Target
LCrypt0rX.vbs
-
Size
32KB
-
MD5
9dcad976bf8ad5f2241f08194d332380
-
SHA1
496bfa3ebe716d4f8206a1bb98d84cd38fa783d5
-
SHA256
d6118a0bbfd98bd76e6f953f4f36f394f57feb26b1f5684d327702bdb072ed29
-
SHA512
cc2953730143770b402924ce5d80b9aecc33dcdd75019abfbcf597c68822409bdb622d041ff66a7e1ab819a63d4bad180435c07ba5a8214ece4ed2df64e955de
-
SSDEEP
384:tjfviu3p49gax5F9W4eHCP5SSbAhM/Q5WQ9Y3HIo3uIudUx9Iq4rDjLggFu6:Zni4218WQ+IoD5oDFu6
-
Modifies WinLogon for persistence
-
UAC bypass
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Blocklisted process makes network request
-
Blocks application from running via registry modification
Adds application to list of disallowed applications.
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory
-
Event Triggered Execution: Image File Execution Options Injection
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v16
Execution
Command and Scripting Interpreter
2PowerShell
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Indicator Removal
4Clear Persistence
1File Deletion
3Modify Registry
4