General
-
Target
2025-01-22_1748fc9c3457f6102469044a18a67095_globeimposter
-
Size
55KB
-
Sample
250122-stf62stnbk
-
MD5
1748fc9c3457f6102469044a18a67095
-
SHA1
ff7a2abf8f53c2cac4d2d7d8c70b1784362414bb
-
SHA256
aec151ab1896489a13e03e2897d3facc8678ffdbd53bd08a01a2d3837f792adc
-
SHA512
3b2baccde64139657ba2cfcb17398078956b8302f32347ff344861ade61f26496e61a8f913df02ce56d7628ee58381b695fd58f92500cd0f9d0c00a9bd6d3463
-
SSDEEP
1536:3ibgutzZi79QlgTHf4tq6KhxXwr3+mG3Kk:3itz479QlOWWXKNGak
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-22_1748fc9c3457f6102469044a18a67095_globeimposter.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-22_1748fc9c3457f6102469044a18a67095_globeimposter.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Public\Videos\how_to_back_files.html
Extracted
C:\Users\Public\Videos\how_to_back_files.html
Targets
-
-
Target
2025-01-22_1748fc9c3457f6102469044a18a67095_globeimposter
-
Size
55KB
-
MD5
1748fc9c3457f6102469044a18a67095
-
SHA1
ff7a2abf8f53c2cac4d2d7d8c70b1784362414bb
-
SHA256
aec151ab1896489a13e03e2897d3facc8678ffdbd53bd08a01a2d3837f792adc
-
SHA512
3b2baccde64139657ba2cfcb17398078956b8302f32347ff344861ade61f26496e61a8f913df02ce56d7628ee58381b695fd58f92500cd0f9d0c00a9bd6d3463
-
SSDEEP
1536:3ibgutzZi79QlgTHf4tq6KhxXwr3+mG3Kk:3itz479QlOWWXKNGak
-
Globeimposter family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (8652) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Clears Network RDP Connection History and Configurations
Remove evidence of malicious network connections to clean up operations traces.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
4Clear Network Connection History and Configurations
1File Deletion
3Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1