General

  • Target

    f46d1ec2c56550f33b4f30f7f0763503b5a59e0004666de62c9483a0b4dfcac7

  • Size

    817KB

  • Sample

    221207-e8ysraed47

  • MD5

    04552db2a9d8be2843b2d03fee3772a5

  • SHA1

    5be03fb16f18a8ab2a911833e602cdcd2b2c34f5

  • SHA256

    f46d1ec2c56550f33b4f30f7f0763503b5a59e0004666de62c9483a0b4dfcac7

  • SHA512

    34b9c1aab0abb06b4c91d4a15b3c8e259e6dd6a134b00ff077969c01999ea13c50ae7144571121d93fcecd9c14e2b0f958ceaeae0b4ee61edf6d794cbbfecd5c

  • SSDEEP

    24576:6h/AKI2l60YNHkxjmGymEGsqMDxwg5+Ro:k/pXIExSKEZqM7e

Malware Config

Extracted

Path

C:\readme.txt

Ransom Note
Attention! All your files, documents, photos, databases and other important files are encrypted The only method of recovering files is to purchase an unique decryptor. Only we can give you this decryptor and only we can recover your files. The server with your decryptor is in a closed network TOR. You can get there by the following ways: ---------------------------------------------------------------------------------------- 1. Download Tor browser - https://www.torproject.org/ 2. Install Tor browser 3. Open Tor Browser 4. Open link in TOR browser: http://obzuqvr5424kkc4unbq2p2i67ny3zngce3tbdr37nicjqesgqcgomfqd.onion/?ST1GHJLMOPR 5. and open ticket ---------------------------------------------------------------------------------------- Alternate communication channel here: https://yip.su/2QstD5 ��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
URLs

http://obzuqvr5424kkc4unbq2p2i67ny3zngce3tbdr37nicjqesgqcgomfqd.onion/?ST1GHJLMOPR

https://yip.su/2QstD5

Targets

    • Target

      f46d1ec2c56550f33b4f30f7f0763503b5a59e0004666de62c9483a0b4dfcac7

    • Size

      817KB

    • MD5

      04552db2a9d8be2843b2d03fee3772a5

    • SHA1

      5be03fb16f18a8ab2a911833e602cdcd2b2c34f5

    • SHA256

      f46d1ec2c56550f33b4f30f7f0763503b5a59e0004666de62c9483a0b4dfcac7

    • SHA512

      34b9c1aab0abb06b4c91d4a15b3c8e259e6dd6a134b00ff077969c01999ea13c50ae7144571121d93fcecd9c14e2b0f958ceaeae0b4ee61edf6d794cbbfecd5c

    • SSDEEP

      24576:6h/AKI2l60YNHkxjmGymEGsqMDxwg5+Ro:k/pXIExSKEZqM7e

    • GlobeImposter

      GlobeImposter is a ransomware first seen in 2017.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks