General

  • Target

    3a85022db4d1b6e43bbfcb4048ef5b9038eb6a09ce8870516539825a88aa27f9

  • Size

    51KB

  • Sample

    220211-ht6ftscah6

  • MD5

    8c9419abb792b2a6d5220533fb221218

  • SHA1

    34cf072cec588286ce5e13baf350239ead5ace8e

  • SHA256

    3a85022db4d1b6e43bbfcb4048ef5b9038eb6a09ce8870516539825a88aa27f9

  • SHA512

    3c44fcf8c91f7ef4059e3caebb31d309dec7bb3d8556079f495ccf308cb3f9e588aa1c8f8c705ce92cdf87a2bbc71ab256634950dcbba49474e2a6942e3a9a00

Malware Config

Extracted

Path

C:\READ THIS.TXT

Ransom Note
Your personal ID : ����������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o data from your computer has been stolen or deleted. * Follow the instructions to restore the files. * How to get the automatic decryptor: 1)Contact us by e-mail: [email protected] . In the letter, indicate your personal identifier (look at the beginning of this document) and the external ip-address of the computer on which the encrypted files are located. 2)After answering your request, our operator will give you further instructions that will show what to do next (the answer you will receive as soon as possible) **Send a copy of the letter to Second email address : [email protected] * Free decryption as guarantee! Before paying you can send us up to 5 files for free decryption. The total size of files must be less than 5 Mb (non archived), and files should not contain valuable information (databases, backups, large excel sheets, etc.). ATTENTION !!! * Do not rename encrypted files. * Do not try to decrypt your data using third party software, it may cause permanent data loss. * Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam. * If you do not receive a reply within 6 hours, create an account on Gmail.com and try again. or just check your email spam.���������

Extracted

Path

C:\READ THIS.TXT

Ransom Note
Your personal ID : ����������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o data from your computer has been stolen or deleted. * Follow the instructions to restore the files. * How to get the automatic decryptor: 1)Contact us by e-mail: [email protected] . In the letter, indicate your personal identifier (look at the beginning of this document) and the external ip-address of the computer on which the encrypted files are located. 2)After answering your request, our operator will give you further instructions that will show what to do next (the answer you will receive as soon as possible) **Send a copy of the letter to Second email address : [email protected] * Free decryption as guarantee! Before paying you can send us up to 5 files for free decryption. The total size of files must be less than 5 Mb (non archived), and files should not contain valuable information (databases, backups, large excel sheets, etc.). ATTENTION !!! * Do not rename encrypted files. * Do not try to decrypt your data using third party software, it may cause permanent data loss. * Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam. * If you do not receive a reply within 6 hours, create an account on Gmail.com and try again. or just check your email spam.���������

Targets

    • Target

      3a85022db4d1b6e43bbfcb4048ef5b9038eb6a09ce8870516539825a88aa27f9

    • Size

      51KB

    • MD5

      8c9419abb792b2a6d5220533fb221218

    • SHA1

      34cf072cec588286ce5e13baf350239ead5ace8e

    • SHA256

      3a85022db4d1b6e43bbfcb4048ef5b9038eb6a09ce8870516539825a88aa27f9

    • SHA512

      3c44fcf8c91f7ef4059e3caebb31d309dec7bb3d8556079f495ccf308cb3f9e588aa1c8f8c705ce92cdf87a2bbc71ab256634950dcbba49474e2a6942e3a9a00

    • GlobeImposter

      GlobeImposter is a ransomware first seen in 2017.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v6

Tasks