General

  • Target

    db3ae704e4ea31b79ad7859acfdd0f2c876aaecac3182af2cd64d9108c2d8525

  • Size

    54KB

  • Sample

    220211-g8sb3sbgf7

  • MD5

    5a5e32203cf8eee1b7e9125b1c97ed94

  • SHA1

    7cd7f7d35abb1bd79cc85db99ff3238ea28c3ef4

  • SHA256

    db3ae704e4ea31b79ad7859acfdd0f2c876aaecac3182af2cd64d9108c2d8525

  • SHA512

    3fe266ff6ed79eef7a5e857d167833bd3b03cda165298066acc9afbf0641d533083c281a07775e2017e5659ba1343daf721e9fdc81021052ca93ed1b5f0cd941

Malware Config

Targets

    • Target

      db3ae704e4ea31b79ad7859acfdd0f2c876aaecac3182af2cd64d9108c2d8525

    • Size

      54KB

    • MD5

      5a5e32203cf8eee1b7e9125b1c97ed94

    • SHA1

      7cd7f7d35abb1bd79cc85db99ff3238ea28c3ef4

    • SHA256

      db3ae704e4ea31b79ad7859acfdd0f2c876aaecac3182af2cd64d9108c2d8525

    • SHA512

      3fe266ff6ed79eef7a5e857d167833bd3b03cda165298066acc9afbf0641d533083c281a07775e2017e5659ba1343daf721e9fdc81021052ca93ed1b5f0cd941

    • GlobeImposter

      GlobeImposter is a ransomware first seen in 2017.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v6

Tasks