General
-
Target
1b82a0c989856a73ff5c46b1f578b8dadc94d40d265a5ef891313d6f73948393
-
Size
72KB
-
Sample
220825-ldcqcsbge9
-
MD5
0a394ea5a6a326d2b8a0f7d6ba4bbd82
-
SHA1
c1e1ad4bab9727d1ff3a0788c51edc223f53f097
-
SHA256
1b82a0c989856a73ff5c46b1f578b8dadc94d40d265a5ef891313d6f73948393
-
SHA512
f7388719ada155e354434b57b438e20c23db44ddf3cf1b4552715d371aec3c5f834992c08eca63b58051472a92996b4d2bb51b1fa5a7671f6c33c731c20bb902
-
SSDEEP
768:7BcNSpIMgsDi8giO5KLC8MkGPXsADPGL69QKN/ZfdV1+nAZjEMzsyy:Fc4IuDdgN5TkGP8A7EUnhV+nAZjE4a
Static task
static1
Behavioral task
behavioral1
Sample
1b82a0c989856a73ff5c46b1f578b8dadc94d40d265a5ef891313d6f73948393.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1b82a0c989856a73ff5c46b1f578b8dadc94d40d265a5ef891313d6f73948393.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\readme.txt
globeimposter
http://obzuqvr5424kkc4unbq2p2i67ny3zngce3tbdr37nicjqesgqcgomfqd.onion/?ST4HYJUHGFV
Targets
-
-
Target
1b82a0c989856a73ff5c46b1f578b8dadc94d40d265a5ef891313d6f73948393
-
Size
72KB
-
MD5
0a394ea5a6a326d2b8a0f7d6ba4bbd82
-
SHA1
c1e1ad4bab9727d1ff3a0788c51edc223f53f097
-
SHA256
1b82a0c989856a73ff5c46b1f578b8dadc94d40d265a5ef891313d6f73948393
-
SHA512
f7388719ada155e354434b57b438e20c23db44ddf3cf1b4552715d371aec3c5f834992c08eca63b58051472a92996b4d2bb51b1fa5a7671f6c33c731c20bb902
-
SSDEEP
768:7BcNSpIMgsDi8giO5KLC8MkGPXsADPGL69QKN/ZfdV1+nAZjEMzsyy:Fc4IuDdgN5TkGP8A7EUnhV+nAZjE4a
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-