General

  • Target

    54756423eddeb6bfca2a15d676956e4bff2c9e7577265d55cd0224e924521c68

  • Size

    319KB

  • Sample

    220725-xx377sbdd4

  • MD5

    1ffeea615ff185601b81abbcec9b16ca

  • SHA1

    8f507aa4a570c503c9b3510169c2f815ef19cb0d

  • SHA256

    54756423eddeb6bfca2a15d676956e4bff2c9e7577265d55cd0224e924521c68

  • SHA512

    9903aa10e7d49a1a813d486a3647f2b4fc4fb4cc0e06906c77160a656a3fdee242a14252bf46b4574a10e4b4c0bb1b6bfd3479d7f1311299a3e78fd289fdfeb4

Malware Config

Extracted

Path

C:\how_to_back_files.html

Ransom Note
<!DOCTYPE html> <html> <head> <meta charset="utf-8" /> <!--[if lt IE 9]><script src="https://cdnjs.cloudflare.com/ajax/libs/html5shiv/3.7.3/html5shiv.min.js"></script><![endif]--> <title>How to open your files</title> <style> * { margin: 0; padding: 0; box-sizing: border-box; -moz-box-sizing: border-box; -webkit-box-sizing: border-box; } footer, main { display: block; } body { font: 15px/18px Arial, sans-serif; width: 100%; background: #f1f1f1; color: #333; } .inner { width: 100%; max-width: 1000px; margin: 0 auto; padding: 30px 10px; } .content, .footer { line-height: 1.5; } .center { text-align: center; } .title { font-size: 22px; font-weight: bold; margin-bottom: 20px; color: #ff2a22; } .content .inner { background: #f1f1f1; padding: 30px; margin: 30px auto 0; } .red { font-weight: bold; color: #ff0000; } .content p { margin-bottom: 13px; } .content p:last-child { margin-bottom: 0; } .email { color: #0066ff; font-style: italic; } ul { margin-left: 30px; } .footer .inner { padding: 30px; margin: 0 auto; border: 6px solid #cccccc; background: #d9d9d9; } .footer .title { font-size: 18px; margin-bottom: 15px; } .footer { padding: 0 30px 30px; color: #333; font-size: 13px; } .id { color: #333; font-size: 10px; } </style> </head> <body> <main class="content"> <div class="inner"> <div class="title center">All your data has been ciphered!</div> <p>The only way of recovering your files is to buy a unique decryptor. <br> A decryptor is fully automatical, all your data will be recovered within a few hours after it’s installation.</p> <p>For purchasing a decryptor contact us by email:<br> <span class="email">[email protected]</span></p> <p>If you will get no answer within 24 hours contact us by our alternate emails:<br> <span class="email">[email protected]</span><br> <span class="email"></span></p> <p>We assure full recovery after the payment. <br> To verify the possibility of the recovery of your files we can decipher 1 file for free. <br> Attach 1 file to the letter (no more than 5Mb). Indicate <span class="red">your personal ID</span> on the letter:<br> <span class="id"> ����������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span> </p> <p>In reply we will send you an deciphered file and an instruction for purchasing an automatical decryptor for all your files. After the payment we will send you a decryptor and an instructions for protecting your computer from network vulnerabilities..</p> </div> </main><!-- .content --> <footer class="footer"> <div class="inner"> <div class="title center">Attention!</div> <ul> <li>Only <span class="email">[email protected]</span>, <span class="email">[email protected]</span> <span class="email"></span> can decipher all your files.</li> <li>Launching of antivirus programs will not help.</li> <li>Changing ciphered files will result in a loose of data.</li> <li>Attempts of deciphering by yourself will result in a loose of data.</li> <li>Decryptors of other users are unique and will not fit your files and use of those will result in a loose of data.</li> </ul> </div> </footer><!-- .footer --> </body> </html>��������
Emails

class="email">[email protected]</span></p>

class="email">[email protected]</span><br>

class="email">[email protected]</span>

class="email">[email protected]</span>

Extracted

Path

C:\how_to_back_files.html

Ransom Note
<!DOCTYPE html> <html> <head> <meta charset="utf-8" /> <!--[if lt IE 9]><script src="https://cdnjs.cloudflare.com/ajax/libs/html5shiv/3.7.3/html5shiv.min.js"></script><![endif]--> <title>How to open your files</title> <style> * { margin: 0; padding: 0; box-sizing: border-box; -moz-box-sizing: border-box; -webkit-box-sizing: border-box; } footer, main { display: block; } body { font: 15px/18px Arial, sans-serif; width: 100%; background: #f1f1f1; color: #333; } .inner { width: 100%; max-width: 1000px; margin: 0 auto; padding: 30px 10px; } .content, .footer { line-height: 1.5; } .center { text-align: center; } .title { font-size: 22px; font-weight: bold; margin-bottom: 20px; color: #ff2a22; } .content .inner { background: #f1f1f1; padding: 30px; margin: 30px auto 0; } .red { font-weight: bold; color: #ff0000; } .content p { margin-bottom: 13px; } .content p:last-child { margin-bottom: 0; } .email { color: #0066ff; font-style: italic; } ul { margin-left: 30px; } .footer .inner { padding: 30px; margin: 0 auto; border: 6px solid #cccccc; background: #d9d9d9; } .footer .title { font-size: 18px; margin-bottom: 15px; } .footer { padding: 0 30px 30px; color: #333; font-size: 13px; } .id { color: #333; font-size: 10px; } </style> </head> <body> <main class="content"> <div class="inner"> <div class="title center">All your data has been ciphered!</div> <p>The only way of recovering your files is to buy a unique decryptor. <br> A decryptor is fully automatical, all your data will be recovered within a few hours after it’s installation.</p> <p>For purchasing a decryptor contact us by email:<br> <span class="email">[email protected]</span></p> <p>If you will get no answer within 24 hours contact us by our alternate emails:<br> <span class="email">[email protected]</span><br> <span class="email"></span></p> <p>We assure full recovery after the payment. <br> To verify the possibility of the recovery of your files we can decipher 1 file for free. <br> Attach 1 file to the letter (no more than 5Mb). Indicate <span class="red">your personal ID</span> on the letter:<br> <span class="id"> ����������B1 6C FD 8A 1F 98 C7 B7 BC D0 75 A9 81 F3 17 81 8E 1E 79 37 DB 89 54 BD 22 EE 99 1D B5 2D 50 FB 69 DE 1D 20 0E BD 34 88 5D 75 DD 81 BB F3 7B 3F A2 3D 9D BE 82 C7 6C 0D 7B F3 E7 DD 57 52 75 8B A3 99 E8 FA CE 8A DE 29 38 78 7D 94 7E F5 E9 99 FE 7C BC 23 AA 5A F7 57 D2 9C 45 D4 D0 01 03 36 D4 C6 E8 EB A2 B3 B7 69 92 C5 36 8C C4 27 E6 37 87 37 19 C6 8C 2C DD 68 7A 65 0E DB 17 67 A7 CA AC 9A 90 50 B8 D7 73 4D 19 D8 B5 0A 8A 20 27 F4 AD 7D 10 BE 8F 05 27 9E E3 35 C9 5D E6 DE 87 31 F2 86 36 67 72 79 C3 38 B7 33 87 91 CC 82 93 62 78 DB 3E 9A F6 85 D4 CD 0E 3F 48 79 1B 97 BE FC 4B 28 BB CE DC 2F A1 37 44 14 BF BD C8 D4 AD 27 B8 C7 DD B5 94 91 2E A0 BE A6 DB 41 7D 98 59 BF 18 1E A6 6E E9 60 87 16 6E 8B 4F 39 30 4B 99 8A 9C AC E7 26 FB E5 66 6B 87 76 9F 86 98 DD D7 20 .</span> </p> <p>In reply we will send you an deciphered file and an instruction for purchasing an automatical decryptor for all your files. After the payment we will send you a decryptor and an instructions for protecting your computer from network vulnerabilities..</p> </div> </main><!-- .content --> <footer class="footer"> <div class="inner"> <div class="title center">Attention!</div> <ul> <li>Only <span class="email">[email protected]</span>, <span class="email">[email protected]</span> <span class="email"></span> can decipher all your files.</li> <li>Launching of antivirus programs will not help.</li> <li>Changing ciphered files will result in a loose of data.</li> <li>Attempts of deciphering by yourself will result in a loose of data.</li> <li>Decryptors of other users are unique and will not fit your files and use of those will result in a loose of data.</li> </ul> </div> </footer><!-- .footer --> </body> </html>��������
Emails

class="email">[email protected]</span></p>

class="email">[email protected]</span><br>

class="email">[email protected]</span>

class="email">[email protected]</span>

Targets

    • Target

      54756423eddeb6bfca2a15d676956e4bff2c9e7577265d55cd0224e924521c68

    • Size

      319KB

    • MD5

      1ffeea615ff185601b81abbcec9b16ca

    • SHA1

      8f507aa4a570c503c9b3510169c2f815ef19cb0d

    • SHA256

      54756423eddeb6bfca2a15d676956e4bff2c9e7577265d55cd0224e924521c68

    • SHA512

      9903aa10e7d49a1a813d486a3647f2b4fc4fb4cc0e06906c77160a656a3fdee242a14252bf46b4574a10e4b4c0bb1b6bfd3479d7f1311299a3e78fd289fdfeb4

    • GlobeImposter

      GlobeImposter is a ransomware first seen in 2017.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v6

Tasks