General
-
Target
c511c1a1978858cbd3383cdf4dcad8444fa5552d9204a635ace5905aa7227f3c
-
Size
51KB
-
Sample
220211-ha293adecj
-
MD5
0ddb168889eec2f95ef141a667a3849f
-
SHA1
31939eb87bce9b2cc98534f2792e784601cb6019
-
SHA256
c511c1a1978858cbd3383cdf4dcad8444fa5552d9204a635ace5905aa7227f3c
-
SHA512
ac3e0e742aa8846e0179abe6f8659fc070c1e4b41aa55cffa8b2dc1c5da81135882c2a41bc0eaf7490ae7bcae685eb910e9a75f13ba916e33e5582a057834e8f
Static task
static1
Behavioral task
behavioral1
Sample
39f5b60188d49196e6c10271a084a755f9553190898438b15107cdb950a4bbde.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
39f5b60188d49196e6c10271a084a755f9553190898438b15107cdb950a4bbde.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\read-me.txt
globeimposter
http://mmeeiix2ejdwkmseycljetmpiwebdvgjts75c63camjofn2cjdoulzqd.onion/?STAHYJUHGFV
http://helpqvrg3cc5mvb3.onion/
Extracted
C:\read-me.txt
globeimposter
http://mmeeiix2ejdwkmseycljetmpiwebdvgjts75c63camjofn2cjdoulzqd.onion/?STAHYJUHGFV
http://helpqvrg3cc5mvb3.onion/
Targets
-
-
Target
39f5b60188d49196e6c10271a084a755f9553190898438b15107cdb950a4bbde.exe
-
Size
51KB
-
MD5
e4e439fc5ade188ba2c69367ba6731b6
-
SHA1
d4b3b403b95d50a2feefa046441600e488b941f4
-
SHA256
39f5b60188d49196e6c10271a084a755f9553190898438b15107cdb950a4bbde
-
SHA512
068d7ba1563bf528520a5106a99245896578ac88b0a3263383cdae8657403deba659c06f429dd83710d1f5afa324a49254dd68911382db71810f98a498e901e7
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-