General

  • Target

    file.exe

  • Size

    646KB

  • Sample

    221201-vmfcaaab62

  • MD5

    fac0564b69ab03050cf82098f98317e1

  • SHA1

    01d6d9b1acd7c97ddf53fe704bfdd7a587f8884f

  • SHA256

    3d8b538a62473db2cd132f6eded5ba1c81c1d04702a40399a702c514247c12dc

  • SHA512

    31723a2f2e90486ba567a7875a406ff548449966a9beb3b795761859f1c4a5b5950c92946d3c74d6d4410057c03d6c22d3bce1710a7099af35fd1d5eee14feb7

  • SSDEEP

    12288:n/fHh2vI2amObUyGDWC7V3zuemBkCljzJVYPzzHuuf9F/Xriz5yP:n/pBmObUXDFykChJVszzH9z/7iz5yP

Malware Config

Extracted

Path

C:\readme.txt

Ransom Note
Attention! All your files, documents, photos, databases and other important files are encrypted The only method of recovering files is to purchase an unique decryptor. Only we can give you this decryptor and only we can recover your files. The server with your decryptor is in a closed network TOR. You can get there by the following ways: ---------------------------------------------------------------------------------------- 1. Download Tor browser - https://www.torproject.org/ 2. Install Tor browser 3. Open Tor Browser 4. Open link in TOR browser: http://obzuqvr5424kkc4unbq2p2i67ny3zngce3tbdr37nicjqesgqcgomfqd.onion/?ST2GHJLMOPR 5. and open ticket ---------------------------------------------------------------------------------------- Alternate communication channel here: https://yip.su/2QstD5 ��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
URLs

http://obzuqvr5424kkc4unbq2p2i67ny3zngce3tbdr37nicjqesgqcgomfqd.onion/?ST2GHJLMOPR

https://yip.su/2QstD5

Extracted

Path

C:\readme.txt

Ransom Note
Attention! All your files, documents, photos, databases and other important files are encrypted The only method of recovering files is to purchase an unique decryptor. Only we can give you this decryptor and only we can recover your files. The server with your decryptor is in a closed network TOR. You can get there by the following ways: ---------------------------------------------------------------------------------------- 1. Download Tor browser - https://www.torproject.org/ 2. Install Tor browser 3. Open Tor Browser 4. Open link in TOR browser: http://obzuqvr5424kkc4unbq2p2i67ny3zngce3tbdr37nicjqesgqcgomfqd.onion/?ST2GHJLMOPR 5. and open ticket ---------------------------------------------------------------------------------------- Alternate communication channel here: https://yip.su/2QstD5 ��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
URLs

http://obzuqvr5424kkc4unbq2p2i67ny3zngce3tbdr37nicjqesgqcgomfqd.onion/?ST2GHJLMOPR

https://yip.su/2QstD5

Targets

    • Target

      file.exe

    • Size

      646KB

    • MD5

      fac0564b69ab03050cf82098f98317e1

    • SHA1

      01d6d9b1acd7c97ddf53fe704bfdd7a587f8884f

    • SHA256

      3d8b538a62473db2cd132f6eded5ba1c81c1d04702a40399a702c514247c12dc

    • SHA512

      31723a2f2e90486ba567a7875a406ff548449966a9beb3b795761859f1c4a5b5950c92946d3c74d6d4410057c03d6c22d3bce1710a7099af35fd1d5eee14feb7

    • SSDEEP

      12288:n/fHh2vI2amObUyGDWC7V3zuemBkCljzJVYPzzHuuf9F/Xriz5yP:n/pBmObUXDFykChJVszzH9z/7iz5yP

    • GlobeImposter

      GlobeImposter is a ransomware first seen in 2017.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks