General

  • Target

    bfa17ca04282f57abf8bff68adb1effb580cf1eeace3b793cc7f0d470ed2ffb4

  • Size

    53KB

  • Sample

    220211-hbq87adecr

  • MD5

    2eff80c8b1c01cdaf739bf8072ffe58b

  • SHA1

    babeda04ca96e3337fbf6336fb74304fbe2cc11a

  • SHA256

    bfa17ca04282f57abf8bff68adb1effb580cf1eeace3b793cc7f0d470ed2ffb4

  • SHA512

    9e191e81c76eda4ceb4364be81742bfcee7ff74dcb459a88fffdc48e5d5918e45f761db4fa4c25bba195a5d9f7a8a3cadfcf027310683fb3a4adc26d8a79fd38

Malware Config

Extracted

Path

C:\Recovery_Instructions.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">����������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span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price (BITCOIN) and get decryption software.</b><br><br> <a href="mailto:[email protected]">[email protected]</a><br> <a href="mailto:[email protected]">[email protected]</a> <hr> </div> <div class="text"> Make contact as soon as possible. Your private key (decryption key) is only <br> stored temporarily.<br> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.<br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>�������������
Emails

href="mailto:[email protected]">[email protected]</a><br>

href="mailto:[email protected]">[email protected]</a>

Extracted

Path

C:\Recovery_Instructions.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">����������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span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price (BITCOIN) and get decryption software.</b><br><br> <a href="mailto:[email protected]">[email protected]</a><br> <a href="mailto:[email protected]">[email protected]</a> <hr> </div> <div class="text"> Make contact as soon as possible. Your private key (decryption key) is only <br> stored temporarily.<br> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.<br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>�������������
Emails

href="mailto:[email protected]">[email protected]</a><br>

href="mailto:[email protected]">[email protected]</a>

Targets

    • Target

      bfa17ca04282f57abf8bff68adb1effb580cf1eeace3b793cc7f0d470ed2ffb4

    • Size

      53KB

    • MD5

      2eff80c8b1c01cdaf739bf8072ffe58b

    • SHA1

      babeda04ca96e3337fbf6336fb74304fbe2cc11a

    • SHA256

      bfa17ca04282f57abf8bff68adb1effb580cf1eeace3b793cc7f0d470ed2ffb4

    • SHA512

      9e191e81c76eda4ceb4364be81742bfcee7ff74dcb459a88fffdc48e5d5918e45f761db4fa4c25bba195a5d9f7a8a3cadfcf027310683fb3a4adc26d8a79fd38

    • GlobeImposter

      GlobeImposter is a ransomware first seen in 2017.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v6

Tasks