Analysis

  • max time kernel
    151s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    28-02-2022 06:51

General

  • Target

    1114.exe

  • Size

    50KB

  • MD5

    fc9ca0a85e47088d25483dd47fba3244

  • SHA1

    fed2e7f2818daf55a463520ec21f337fc8679246

  • SHA256

    e8e6365ddaf5b0a40250eaab09bc61904ad5818c835ae2555c36ddc380c70ece

  • SHA512

    a4f8f0004cbcef618f5bad7ab26b83617f5107a176c68cbae6497e7acf4a36d7f690a1c9ab459d68d2d4b3153de2939857dee4ea8706d107294fcdfb67f2127c

Malware Config

Extracted

Path

C:\read_me.txt

Family

globeimposter

Ransom Note
All your files are Encrypted! For data recovery needs decryptor. How to buy decryptor: ---------------------------------------------------------------------------------------- | 1. Download Tor browser - https://www.torproject.org/ and install it. | 2. Open link in TOR browser - http://mrv44idagzu47oktcipn6tlll6nzapi6pk3u7ehsucl4hpxon45dl4yd.onion/?ST4HYJUHGFV | 3. Create Ticket ---------------------------------------------------------------------------------------- Note! This link is available via Tor Browser only. ------------------------------------------------------------ or http://yip.su/2QstD5 Your ID �������������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
URLs

http://mrv44idagzu47oktcipn6tlll6nzapi6pk3u7ehsucl4hpxon45dl4yd.onion/?ST4HYJUHGFV

http://yip.su/2QstD5

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Modifies extensions of user files 6 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 28 IoCs
  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1114.exe
    "C:\Users\Admin\AppData\Local\Temp\1114.exe"
    1⤵
    • Modifies extensions of user files
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    PID:1940

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1940-55-0x00000000760F1000-0x00000000760F3000-memory.dmp

    Filesize

    8KB