General
-
Target
03221c14baf01f212678ab40bce0bda4d4d1707f7978dca4fff2c1cc77da16a8
-
Size
369KB
-
Sample
220829-l5y3nsfebn
-
MD5
9913416c1e459d6aa98f851e4072aa3e
-
SHA1
17b4bb3ca5b2484d69a3bfb2b235d8e0eafebbae
-
SHA256
03221c14baf01f212678ab40bce0bda4d4d1707f7978dca4fff2c1cc77da16a8
-
SHA512
bf1daf7445760fb36c7cd128d05920c53d5da95d52e8f68591b1b03b60ab4e1eda44346e166d18898d12d6f0a5e54ce2754f0e6781bab6f472b8dfa0b33a269c
-
SSDEEP
3072:fjzXnwdjWXxTi+VnFEeLIehTjRwfq7oKDPAa50wPU6j6/nI3nR:fjzA6xT3EeMCTjRwfqUKDPt5xe/nWnR
Static task
static1
Behavioral task
behavioral1
Sample
03221c14baf01f212678ab40bce0bda4d4d1707f7978dca4fff2c1cc77da16a8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
03221c14baf01f212678ab40bce0bda4d4d1707f7978dca4fff2c1cc77da16a8.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\readme.txt
globeimposter
http://obzuqvr5424kkc4unbq2p2i67ny3zngce3tbdr37nicjqesgqcgomfqd.onion/?ST4HYJUHGFV
Extracted
C:\readme.txt
globeimposter
http://obzuqvr5424kkc4unbq2p2i67ny3zngce3tbdr37nicjqesgqcgomfqd.onion/?ST4HYJUHGFV
Targets
-
-
Target
03221c14baf01f212678ab40bce0bda4d4d1707f7978dca4fff2c1cc77da16a8
-
Size
369KB
-
MD5
9913416c1e459d6aa98f851e4072aa3e
-
SHA1
17b4bb3ca5b2484d69a3bfb2b235d8e0eafebbae
-
SHA256
03221c14baf01f212678ab40bce0bda4d4d1707f7978dca4fff2c1cc77da16a8
-
SHA512
bf1daf7445760fb36c7cd128d05920c53d5da95d52e8f68591b1b03b60ab4e1eda44346e166d18898d12d6f0a5e54ce2754f0e6781bab6f472b8dfa0b33a269c
-
SSDEEP
3072:fjzXnwdjWXxTi+VnFEeLIehTjRwfq7oKDPAa50wPU6j6/nI3nR:fjzA6xT3EeMCTjRwfqUKDPt5xe/nWnR
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-