General

  • Target

    c0d8c6b85e5e0de3cba8bf5f3ede4e27f3e29fc85e3dcbbb5477775d8a12c186

  • Size

    52KB

  • Sample

    220211-hbl98sdecp

  • MD5

    58fd0867cc3b0084a620025eb08fec54

  • SHA1

    e886e4cc71f5f54625fb000cc9709929bdbaf05a

  • SHA256

    c0d8c6b85e5e0de3cba8bf5f3ede4e27f3e29fc85e3dcbbb5477775d8a12c186

  • SHA512

    5bea2fbd601e26f0ad2c4191198f54dffc6e19f1d1d85c670f7a1a7ad5b475b97865fe6eb68e031c242c2f3d12b074782e43da7132259cc6fe04875ba7d2c385

Malware Config

Extracted

Path

C:\how_to_back_files.html

Ransom Note
<!DOCTYPE html> <html> <head> <meta charset="utf-8" /> <!--[if lt IE 9]><script src="https://cdnjs.cloudflare.com/ajax/libs/html5shiv/3.7.3/html5shiv.min.js"></script><![endif]--> <title>How to open your files</title> <style> * { margin: 0; padding: 0; box-sizing: border-box; -moz-box-sizing: border-box; -webkit-box-sizing: border-box; } footer, main { display: block; } body { font: 15px/18px Arial, sans-serif; width: 100%; background: #f1f1f1; color: #333; } .inner { width: 100%; max-width: 1000px; margin: 0 auto; padding: 30px 10px; } .content, .footer { line-height: 1.5; } .center { text-align: center; } .title { font-size: 22px; font-weight: bold; margin-bottom: 20px; color: #ff2a22; } .content .inner { background: #f1f1f1; padding: 30px; margin: 30px auto 0; } .red { font-weight: bold; color: #ff0000; } .content p { margin-bottom: 13px; } .content p:last-child { margin-bottom: 0; } .email { color: #0066ff; font-style: italic; } ul { margin-left: 30px; } .footer .inner { padding: 30px; margin: 0 auto; border: 6px solid #cccccc; background: #d9d9d9; } .footer .title { font-size: 18px; margin-bottom: 15px; } .footer { padding: 0 30px 30px; color: #333; font-size: 13px; } .id { color: #333; font-size: 10px; } </style> </head> <body> <main class="content"> <div class="inner"> <div class="title center">All your data has been ciphered!</div> <p>The only way of recovering your files is to buy a unique decryptor. <br> A decryptor is fully automatical, all your data will be recovered within a few hours after it’s installation.</p> <p>For purchasing a decryptor contact us by email:<br> <span class="email">[email protected]</span></p> <p>If you will get no answer within 24 hours contact us by our alternate emails:<br> <span class="email">[email protected]</span><br> <span class="email"></span></p> <p>We assure full recovery after the payment. <br> To verify the possibility of the recovery of your files we can decipher 1 file for free. <br> Attach 1 file to the letter (no more than 25Mb). Indicate <span class="red">your personal ID</span> on the letter:<br> <span class="id"> ������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span> </p> <p>In reply we will send you an deciphered file and an instruction for purchasing an automatical decryptor for all your files. After the payment we will send you a decryptor and an instructions for protecting your computer from network vulnerabilities..</p> </div> </main><!-- .content --> <footer class="footer"> <div class="inner"> <div class="title center">Attention!</div> <ul> <li>Only <span class="email">[email protected]</span>, <span class="email">[email protected]</span> <span class="email"></span> can decipher all your files.</li> <li>Launching of antivirus programs will not help.</li> <li>Changing ciphered files will result in a loose of data.</li> <li>Attempts of deciphering by yourself will result in a loose of data.</li> <li>Decryptors of other users are unique and will not fit your files and use of those will result in a loose of data.</li> </ul> </div> </footer><!-- .footer --> </body> </html>�����
Emails

class="email">[email protected]</span></p>

class="email">[email protected]</span><br>

class="email">[email protected]</span>

class="email">[email protected]</span>

Extracted

Path

C:\how_to_back_files.html

Ransom Note
<!DOCTYPE html> <html> <head> <meta charset="utf-8" /> <!--[if lt IE 9]><script src="https://cdnjs.cloudflare.com/ajax/libs/html5shiv/3.7.3/html5shiv.min.js"></script><![endif]--> <title>How to open your files</title> <style> * { margin: 0; padding: 0; box-sizing: border-box; -moz-box-sizing: border-box; -webkit-box-sizing: border-box; } footer, main { display: block; } body { font: 15px/18px Arial, sans-serif; width: 100%; background: #f1f1f1; color: #333; } .inner { width: 100%; max-width: 1000px; margin: 0 auto; padding: 30px 10px; } .content, .footer { line-height: 1.5; } .center { text-align: center; } .title { font-size: 22px; font-weight: bold; margin-bottom: 20px; color: #ff2a22; } .content .inner { background: #f1f1f1; padding: 30px; margin: 30px auto 0; } .red { font-weight: bold; color: #ff0000; } .content p { margin-bottom: 13px; } .content p:last-child { margin-bottom: 0; } .email { color: #0066ff; font-style: italic; } ul { margin-left: 30px; } .footer .inner { padding: 30px; margin: 0 auto; border: 6px solid #cccccc; background: #d9d9d9; } .footer .title { font-size: 18px; margin-bottom: 15px; } .footer { padding: 0 30px 30px; color: #333; font-size: 13px; } .id { color: #333; font-size: 10px; } </style> </head> <body> <main class="content"> <div class="inner"> <div class="title center">All your data has been ciphered!</div> <p>The only way of recovering your files is to buy a unique decryptor. <br> A decryptor is fully automatical, all your data will be recovered within a few hours after it’s installation.</p> <p>For purchasing a decryptor contact us by email:<br> <span class="email">[email protected]</span></p> <p>If you will get no answer within 24 hours contact us by our alternate emails:<br> <span class="email">[email protected]</span><br> <span class="email"></span></p> <p>We assure full recovery after the payment. <br> To verify the possibility of the recovery of your files we can decipher 1 file for free. <br> Attach 1 file to the letter (no more than 25Mb). Indicate <span class="red">your personal ID</span> on the letter:<br> <span class="id"> ������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span> </p> <p>In reply we will send you an deciphered file and an instruction for purchasing an automatical decryptor for all your files. After the payment we will send you a decryptor and an instructions for protecting your computer from network vulnerabilities..</p> </div> </main><!-- .content --> <footer class="footer"> <div class="inner"> <div class="title center">Attention!</div> <ul> <li>Only <span class="email">[email protected]</span>, <span class="email">[email protected]</span> <span class="email"></span> can decipher all your files.</li> <li>Launching of antivirus programs will not help.</li> <li>Changing ciphered files will result in a loose of data.</li> <li>Attempts of deciphering by yourself will result in a loose of data.</li> <li>Decryptors of other users are unique and will not fit your files and use of those will result in a loose of data.</li> </ul> </div> </footer><!-- .footer --> </body> </html>�����
Emails

class="email">[email protected]</span></p>

class="email">[email protected]</span><br>

class="email">[email protected]</span>

class="email">[email protected]</span>

Targets

    • Target

      c0d8c6b85e5e0de3cba8bf5f3ede4e27f3e29fc85e3dcbbb5477775d8a12c186

    • Size

      52KB

    • MD5

      58fd0867cc3b0084a620025eb08fec54

    • SHA1

      e886e4cc71f5f54625fb000cc9709929bdbaf05a

    • SHA256

      c0d8c6b85e5e0de3cba8bf5f3ede4e27f3e29fc85e3dcbbb5477775d8a12c186

    • SHA512

      5bea2fbd601e26f0ad2c4191198f54dffc6e19f1d1d85c670f7a1a7ad5b475b97865fe6eb68e031c242c2f3d12b074782e43da7132259cc6fe04875ba7d2c385

    • GlobeImposter

      GlobeImposter is a ransomware first seen in 2017.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v6

Tasks