General
-
Target
35fc2092e400f3e94384de93ca5f4293f1bc6607a76b20d4702c0372eea132ef
-
Size
170KB
-
Sample
220825-ld3xjsbgf4
-
MD5
c6b7bfd71bd9266d2f6a7765d792e8f5
-
SHA1
cfecd233b084e49d66ac63943e7370bdcb3afdef
-
SHA256
35fc2092e400f3e94384de93ca5f4293f1bc6607a76b20d4702c0372eea132ef
-
SHA512
0b0bba5bb84de2be5f983438ff05fdef4d66aff7302045858254a50b8e75fdd1329a9edd90ad463b0a94087c84f7fd93ac96bb8a688b6f159d5c2e5e845298a0
-
SSDEEP
1536:J7kSVXrB7T0hoAOwC6NXFZcRGOgaRFOvA+v/T3YpKuz:9z1/0POX6NvPaRFOlv/k
Static task
static1
Behavioral task
behavioral1
Sample
35fc2092e400f3e94384de93ca5f4293f1bc6607a76b20d4702c0372eea132ef.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
35fc2092e400f3e94384de93ca5f4293f1bc6607a76b20d4702c0372eea132ef.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\readme.txt
globeimposter
http://obzuqvr5424kkc4unbq2p2i67ny3zngce3tbdr37nicjqesgqcgomfqd.onion/?ST4HYJUHGFV
Extracted
C:\readme.txt
globeimposter
http://obzuqvr5424kkc4unbq2p2i67ny3zngce3tbdr37nicjqesgqcgomfqd.onion/?ST4HYJUHGFV
Targets
-
-
Target
35fc2092e400f3e94384de93ca5f4293f1bc6607a76b20d4702c0372eea132ef
-
Size
170KB
-
MD5
c6b7bfd71bd9266d2f6a7765d792e8f5
-
SHA1
cfecd233b084e49d66ac63943e7370bdcb3afdef
-
SHA256
35fc2092e400f3e94384de93ca5f4293f1bc6607a76b20d4702c0372eea132ef
-
SHA512
0b0bba5bb84de2be5f983438ff05fdef4d66aff7302045858254a50b8e75fdd1329a9edd90ad463b0a94087c84f7fd93ac96bb8a688b6f159d5c2e5e845298a0
-
SSDEEP
1536:J7kSVXrB7T0hoAOwC6NXFZcRGOgaRFOvA+v/T3YpKuz:9z1/0POX6NvPaRFOlv/k
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-