General
-
Target
2025-01-24_1ed24af8523f92a06bbb53405709a2d8_globeimposter
-
Size
53KB
-
Sample
250124-qmwxtazpdv
-
MD5
1ed24af8523f92a06bbb53405709a2d8
-
SHA1
ee1d93efc1e2f8d7e4846f9e5880dbb987702a57
-
SHA256
578f95ed736938c95f45db89904f7292fca9519b2f0e2ed6b3200848ca737932
-
SHA512
054966e0cff1a3dc37160c3d35076ab6c3759f618ce71e369726002d18deae86824e7cf48fe97b9dc38a9f887b339c97b42d760d2eb77cb760b7bae744beba52
-
SSDEEP
1536:kPKs+Na3IGeKJolntwr7DSTWvTwhQ8YioW:kPKs+Na3IrKJolntGDT5Xt
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-24_1ed24af8523f92a06bbb53405709a2d8_globeimposter.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-24_1ed24af8523f92a06bbb53405709a2d8_globeimposter.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Public\Videos\how_to_back_files.html
Extracted
C:\Users\Public\Videos\how_to_back_files.html
Targets
-
-
Target
2025-01-24_1ed24af8523f92a06bbb53405709a2d8_globeimposter
-
Size
53KB
-
MD5
1ed24af8523f92a06bbb53405709a2d8
-
SHA1
ee1d93efc1e2f8d7e4846f9e5880dbb987702a57
-
SHA256
578f95ed736938c95f45db89904f7292fca9519b2f0e2ed6b3200848ca737932
-
SHA512
054966e0cff1a3dc37160c3d35076ab6c3759f618ce71e369726002d18deae86824e7cf48fe97b9dc38a9f887b339c97b42d760d2eb77cb760b7bae744beba52
-
SSDEEP
1536:kPKs+Na3IGeKJolntwr7DSTWvTwhQ8YioW:kPKs+Na3IrKJolntGDT5Xt
-
Globeimposter family
-
Renames multiple (8654) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1