General

  • Target

    2025-04-03_778ec99ed08d832a8bc2194744e8c12a_globeimposter

  • Size

    54KB

  • Sample

    250403-a1s53swth1

  • MD5

    778ec99ed08d832a8bc2194744e8c12a

  • SHA1

    ec359a3c19e321bf5c4b01ef7eb64dfcf5851d04

  • SHA256

    a47d52573f5db76b36f37a70290db75d684a914eb773dd102a726aa73deb4bf7

  • SHA512

    567c76792a6fcf18f17d430522d524128af8d102c183690afa8f291d50af608a2b53817bc410600165bd80a06d7338117e0302f137dc53d82e63d8268cd2938d

  • SSDEEP

    768:4itKvuye1kVtGBk6P/v7nWlHznbkVwrEKD9yDwxVSHrowNI2tG6o/t84B5HmbSZf:toeytM3alnawrRIwxVSHMweio3FzZAW

Malware Config

Extracted

Path

C:\Users\Public\Pictures\how_to_back_files.html

Ransom Note
<html> <style type="text/css"> body { background-color: #404040; } { margin: 0; padding: 0; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ width: 800px; display: block; margin: auto; position: relative; } .tabs1 .head{ text-align: center; float: top; text-transform: uppercase; font-weight: normal; display: block; padding: 5px; color: #FF0000; background: #303030; } .tabs1 .identi { margin-left: 0px; line-height: 13px; font-size: 13px; text-align: center; float: top; display: block; padding: 15px; background: #303030; color: #DFDFDF; } /*---*/ .tabs{ width: 800px; display: block; margin: auto; position: relative; } .tabs .tab{ float: left; display: block; } .tabs .tab>input[type="radio"] { position: absolute; top: -9999px; left: -9999px; } .tabs .tab>label { display: block; padding: 6px 21px; font-size: 18x; text-transform: uppercase; cursor: pointer; position: relative; color: #FFF; background: #4A83FD; } .tabs .content { z-index: 0;/* or display: none; */ overflow: hidden; width: 800px; /*padding: 25px;*/ position: absolute; top: 32px; left: 0; background: #303030; color: #DFDFDF; opacity:0; transition: opacity 400ms ease-out; } .tabs .content .text{ width: 700px; padding: 25px; } .tabs>.tab>[id^="tab"]:checked + label { top:0; background: #303030; color: #F5F5F5; } .tabs>.tab>[id^="tab"]:checked ~ [id^="tab-content"] { z-index: 1;/* or display: block; */ opacity: 1; transition: opacity 400ms ease-out; } </style> <head> <meta charset="utf-8"> <title>HOW TO DECRYPT YOUR FILES</title> </head> <body> <div class="tabs1"> <div class="head" ><h3>Your personal ID</h3></div> <div class="identi"> <pre>��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p> </pre><!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <input type="radio" name="tabs" checked="checked" id="tab1" /> <label for="tab1">English</label> <div id="tab-content1" class="content"> <h1>&#9763; Your files are encrypted! &#9763;</h1> <hr/> <h3> &#11015 To decrypt, follow the instructions below. &#11015 </h3> <br/> <div class="text"> <!--text data --> To recover data you need decrypt tool.</br> To get the decrypt tool you should:</br> <p>Send 1 crypted test image or text file or document to <span> <font color="FF0000"> [email protected] </font></span></br> (Or alternate mail <font color="FF0000"> [email protected] </font>)<p> In the letter include your personal ID (look at the beginning of this document). Send me this ID in your first email to me</p> We will give you free test for decrypt few files (NOT VALUE) and assign the price for decryption all files</p> After we send you instruction how to pay for decrypt tool and after payment you will receive a decrypt tool and instructions how to use it We can decrypt few files in quality the evidence that we have the decoder.</br> <hr color=red> <center><p style="color:#FF0000">MOST IMPORTANT!!!</p></center> <center><p style="color:#FF0000"> Do not contact other services that promise to decrypt your files, this is fraud on their part! They will buy a decoder from us, and you will pay more for his services. No one, except [email protected], will decrypt your files.</p></center> <hr color=red> <ul> <li>Only [email protected] can decrypt your files</li> <li>Do not trust anyone besides [email protected]</li> <li>Antivirus programs can delete this document and you can not contact us later.</li> <li>Attempts to self-decrypting files will result in the loss of your data</li> <li>Decoders other users are not compatible with your data, because each user's unique encryption key</li> </ul> <!--text data --> </div> </div> </div> <!--tab--> </ul> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html> ������������

Targets

    • Target

      2025-04-03_778ec99ed08d832a8bc2194744e8c12a_globeimposter

    • Size

      54KB

    • MD5

      778ec99ed08d832a8bc2194744e8c12a

    • SHA1

      ec359a3c19e321bf5c4b01ef7eb64dfcf5851d04

    • SHA256

      a47d52573f5db76b36f37a70290db75d684a914eb773dd102a726aa73deb4bf7

    • SHA512

      567c76792a6fcf18f17d430522d524128af8d102c183690afa8f291d50af608a2b53817bc410600165bd80a06d7338117e0302f137dc53d82e63d8268cd2938d

    • SSDEEP

      768:4itKvuye1kVtGBk6P/v7nWlHznbkVwrEKD9yDwxVSHrowNI2tG6o/t84B5HmbSZf:toeytM3alnawrRIwxVSHMweio3FzZAW

    • GlobeImposter

      GlobeImposter is a ransomware first seen in 2017.

    • Globeimposter family

    • Renames multiple (9133) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

MITRE ATT&CK Enterprise v15

Tasks