General

  • Target

    7FA0FC4B901FF3BB9002F33B4A7F0A01AEF10F36C8304.exe

  • Size

    30KB

  • Sample

    220902-z7enpscdhp

  • MD5

    0d7eb2137c2d696071df27cc6a601a5a

  • SHA1

    f3e487886630e0729fb4b4967cd11c2ee0daa989

  • SHA256

    7fa0fc4b901ff3bb9002f33b4a7f0a01aef10f36c8304d26cdbf0934a9fd816f

  • SHA512

    1b6f45cd581d3cd8292d8b97b840473eddb5239ce07037a8d34cf1530dc6c35613591e1d06f56453b50060d0df8d6066cc675a8cde3018220547597515e8f662

  • SSDEEP

    768:8t6+ztmVfbHmHS8/ckpKd75wiqjUKPO6AAb3vM8pYwA:2ztmJbHmHT/zKdVwigUAAK3qw

Malware Config

Extracted

Path

\??\M:\readme.txt

Family

globeimposter

Ransom Note
All your files are Encrypted! For data recovery needs decryptor. How to buy decryptor: ---------------------------------------------------------------------------------------- | 1. Download Tor browser - https://www.torproject.org/ and install it. | 2. Open link in TOR browser - http://obzuqvr5424kkc4unbq2p2i67ny3zngce3tbdr37nicjqesgqcgomfqd.onion/?ST4HYJUHGFV | 3. Create Ticket ---------------------------------------------------------------------------------------- Note! This link is available via Tor Browser only. ------------------------------------------------------------ Your ID ���������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
URLs

http://obzuqvr5424kkc4unbq2p2i67ny3zngce3tbdr37nicjqesgqcgomfqd.onion/?ST4HYJUHGFV

Extracted

Path

\??\M:\Boot\bg-BG\ReadMe.txt

Ransom Note
Attention! All your files, documents, photos, databases and other important files are encrypted The only method of recovering files is to purchase an unique decryptor. Only we can give you this decryptor and only we can recover your files. The server with your decryptor is in a closed network TOR. You can get there by the following ways: ---------------------------------------------------------------------------------------- 1. Download Tor browser - https://www.torproject.org/ 2. Install Tor browser 3. Open Tor Browser 4. Open link in TOR browser: http://obzuqvr5424kkc4unbq2p2i67ny3zngce3tbdr37nicjqesgqcgomfqd.onion/?403FWYPRSKL 5. and open ticket ---------------------------------------------------------------------------------------- Alternate communication channel here: https://yip.su/2QstD5
URLs

http://obzuqvr5424kkc4unbq2p2i67ny3zngce3tbdr37nicjqesgqcgomfqd.onion/?403FWYPRSKL

https://yip.su/2QstD5

Extracted

Family

redline

Botnet

0025

C2

216.52.57.15:38185

Attributes
  • auth_value

    e3493445b68f497cdc542eee79f1a761

Targets

    • Target

      7FA0FC4B901FF3BB9002F33B4A7F0A01AEF10F36C8304.exe

    • Size

      30KB

    • MD5

      0d7eb2137c2d696071df27cc6a601a5a

    • SHA1

      f3e487886630e0729fb4b4967cd11c2ee0daa989

    • SHA256

      7fa0fc4b901ff3bb9002f33b4a7f0a01aef10f36c8304d26cdbf0934a9fd816f

    • SHA512

      1b6f45cd581d3cd8292d8b97b840473eddb5239ce07037a8d34cf1530dc6c35613591e1d06f56453b50060d0df8d6066cc675a8cde3018220547597515e8f662

    • SSDEEP

      768:8t6+ztmVfbHmHS8/ckpKd75wiqjUKPO6AAb3vM8pYwA:2ztmJbHmHT/zKdVwigUAAK3qw

    • Detects Smokeloader packer

    • GlobeImposter

      GlobeImposter is a ransomware first seen in 2017.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks