Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/03/2025, 16:39

General

  • Target

    2025-03-09_87912357fbb9a6c364e6bcd19c4a18a3_globeimposter.exe

  • Size

    56KB

  • MD5

    87912357fbb9a6c364e6bcd19c4a18a3

  • SHA1

    95e29b3707f52e95cb0fd70a8da55316c5531acf

  • SHA256

    3e0fb8b5ebfa831551eb3c713fe69ca4bca935716877693aab5cba444439cec8

  • SHA512

    ceadd7f42a89f66f9a8a24b29d9f6ad8464ed9e17c7d99ea0dc38e7dbd5b8a3ed180dae9cb77c527eea5c7d057e32c26b355aaa8b84674f951b73dda890c2620

  • SSDEEP

    1536:z6sjkfV+KJolntwrbDSTWvTwhQMhmpdLz0:z6s4fIKJolntGDT5qm3L

Malware Config

Extracted

Path

C:\Users\Public\Pictures\how_to_back_files.html

Ransom Note
<html> <style type="text/css"> body { background-color: #404040; } { margin: 0; padding: 0; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ width: 800px; display: block; margin: auto; position: relative; } .tabs1 .head{ text-align: center; float: top; text-transform: uppercase; font-weight: normal; display: block; padding: 15px; color: #000000; background: #4A83FD; } .tabs1 .identi { margin-left: 15px; line-height: 13px; font-size: 13px; text-align: center; float: top; display: block; padding: 15px; background: #303030; color: #DFDFDF; } /*---*/ .tabs{ width: 800px; display: block; margin: auto; position: relative; } .tabs .tab{ float: left; display: block; } .tabs .tab>input[type="radio"] { position: absolute; top: -9999px; left: -9999px; } .tabs .tab>label { display: block; padding: 6px 21px; font-size: 18x; text-transform: uppercase; cursor: pointer; position: relative; color: #FFF; background: #4A83FD; } .tabs .content { z-index: 0;/* or display: none; */ overflow: hidden; width: 800px; /*padding: 25px;*/ position: absolute; top: 32px; left: 0; background: #303030; color: #DFDFDF; opacity:0; transition: opacity 400ms ease-out; } .tabs .content .text{ width: 700px; padding: 25px; } .tabs>.tab>[id^="tab"]:checked + label { top: 0; background: #303030; color: #F5F5F5; } .tabs>.tab>[id^="tab"]:checked ~ [id^="tab-content"] { z-index: 1;/* or display: block; */ opacity: 1; transition: opacity 400ms ease-out; } </style> <head> <meta charset="utf-8"> <title>HOW TO DECRYPT YOUR FILES</title> </head> <body> <div class="tabs1"> <div class="head" ><h3>Your personal ID</h3></div> <div class="identi"> <pre>���������������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pre><!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <input type="radio" name="tabs" checked="checked" id="tab1" /> <label for="tab1">English</label> <div id="tab-content1" class="content"> <h1>&#9760; Your corporate network locked! &#9760;</h1> <hr/> <h3>All your important data has been encrypted.</h3> <br/> <div class="text"> <!--text data --> <h3>To restore files you will need a decryptor!</h3> <center>To get the decryptor you should:</center></br> <center>Pay for decrypt your network - 0.5 BTC </center></br> <div align="left"> <strong>Buy BTC on one of these sites</strong> </div> <div align="left"> <ol> <li><strong>https://binance.com</strong></li> <li><strong>https://www.coinbase.com</strong></li> <li><strong>Any site you trust</strong></li> </ol> </div> <div align="left"> <h1><br> </h1> </div> <div align="left"> &#10004; Bitcoin Wallet: 3FmLKtBZB435pwa8BTknPKXsUeYkRu4u82 <center> </center></br> &#10004; Send $1000 usd in BTC for decrypt <center> </center></br> &#10004; Our contacts: <center> </center></br> &#128386; email: [email protected] <center> </center></br> &#9998; ToxID: 9CDB535E2DFE3DFAFF17A2263A03A684B816FC9E69F159301D25E56C8EB47C32468D0F8129BD <center> </center></br> &#9998; You can download TOXChat here : <a href=>https://tox.chat/download.html</a> <center> </center></br> The message must contain your Personal ID! it is at top of this document. <center> </center></br> <center> </center></br> <center> <span style="color: #FF4500;"> Never pay to any other addresse BTC than those listed here! We do not use any other messengers except TOX and the contact listed here! Remember! Turning to an intermediary - you risk losing your money, always ask for help yourself using the contacts indicated in this document.</span></p> </center></br> <center>----------------------------------------------------------------------------- <center> </center></br> <center> </center></br> <center> </center></br> <center> &#169; 2025 Suffering Corporation | All Rights Reserved.</center></br> </ul> <!--text data --> </div> </div> </div> <!--tab--> </ul> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html> ���������
Wallets

3FmLKtBZB435pwa8BTknPKXsUeYkRu4u82

Signatures

  • Renames multiple (8545) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 29 IoCs
  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-03-09_87912357fbb9a6c364e6bcd19c4a18a3_globeimposter.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-03-09_87912357fbb9a6c364e6bcd19c4a18a3_globeimposter.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Public\Pictures\how_to_back_files.html

    Filesize

    5KB

    MD5

    fea7289171ee4bc2442ab999f2efbd9e

    SHA1

    58d2e0b2a4a0ec33b4dac7df2588b113652b27c9

    SHA256

    8420ba5f259579b62b7aac86529b4bee913c8c06faa5e73886a2845ee105d440

    SHA512

    253ceab604069f267944246e44a4f4bdfc52d24c0d33c3920f1c113e51cdf873846aa7b93615e728dfccca108711e16c1d1b508c6dac31c3d8caaae7463ebbfa

  • memory/3392-0-0x0000000000400000-0x000000000040EE00-memory.dmp

    Filesize

    59KB

  • memory/3392-643-0x0000000000400000-0x000000000040EE00-memory.dmp

    Filesize

    59KB