Resubmissions

03/04/2025, 00:59

250403-bcla1ayqw2 10

03/04/2025, 00:55

250403-a9swnsyqs5 10

General

  • Target

    2025-04-03_778ec99ed08d832a8bc2194744e8c12a_globeimposter

  • Size

    54KB

  • Sample

    250403-bcla1ayqw2

  • MD5

    778ec99ed08d832a8bc2194744e8c12a

  • SHA1

    ec359a3c19e321bf5c4b01ef7eb64dfcf5851d04

  • SHA256

    a47d52573f5db76b36f37a70290db75d684a914eb773dd102a726aa73deb4bf7

  • SHA512

    567c76792a6fcf18f17d430522d524128af8d102c183690afa8f291d50af608a2b53817bc410600165bd80a06d7338117e0302f137dc53d82e63d8268cd2938d

  • SSDEEP

    768:4itKvuye1kVtGBk6P/v7nWlHznbkVwrEKD9yDwxVSHrowNI2tG6o/t84B5HmbSZf:toeytM3alnawrRIwxVSHMweio3FzZAW

Malware Config

Extracted

Path

C:\Users\Public\Pictures\how_to_back_files.html

Ransom Note
<html> <style type="text/css"> body { background-color: #404040; } { margin: 0; padding: 0; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ width: 800px; display: block; margin: auto; position: relative; } .tabs1 .head{ text-align: center; float: top; text-transform: uppercase; font-weight: normal; display: block; padding: 5px; color: #FF0000; background: #303030; } .tabs1 .identi { margin-left: 0px; line-height: 13px; font-size: 13px; text-align: center; float: top; display: block; padding: 15px; background: #303030; color: #DFDFDF; } /*---*/ .tabs{ width: 800px; display: block; margin: auto; position: relative; } .tabs .tab{ float: left; display: block; } .tabs .tab>input[type="radio"] { position: absolute; top: -9999px; left: -9999px; } .tabs .tab>label { display: block; padding: 6px 21px; font-size: 18x; text-transform: uppercase; cursor: pointer; position: relative; color: #FFF; background: #4A83FD; } .tabs .content { z-index: 0;/* or display: none; */ overflow: hidden; width: 800px; /*padding: 25px;*/ position: absolute; top: 32px; left: 0; background: #303030; color: #DFDFDF; opacity:0; transition: opacity 400ms ease-out; } .tabs .content .text{ width: 700px; padding: 25px; } .tabs>.tab>[id^="tab"]:checked + label { top:0; background: #303030; color: #F5F5F5; } .tabs>.tab>[id^="tab"]:checked ~ [id^="tab-content"] { z-index: 1;/* or display: block; */ opacity: 1; transition: opacity 400ms ease-out; } </style> <head> <meta charset="utf-8"> <title>HOW TO DECRYPT YOUR FILES</title> </head> <body> <div class="tabs1"> <div class="head" ><h3>Your personal ID</h3></div> <div class="identi"> <pre>��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p> </pre><!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <input type="radio" name="tabs" checked="checked" id="tab1" /> <label for="tab1">English</label> <div id="tab-content1" class="content"> <h1>&#9763; Your files are encrypted! &#9763;</h1> <hr/> <h3> &#11015 To decrypt, follow the instructions below. &#11015 </h3> <br/> <div class="text"> <!--text data --> To recover data you need decrypt tool.</br> To get the decrypt tool you should:</br> <p>Send 1 crypted test image or text file or document to <span> <font color="FF0000"> [email protected] </font></span></br> (Or alternate mail <font color="FF0000"> [email protected] </font>)<p> In the letter include your personal ID (look at the beginning of this document). Send me this ID in your first email to me</p> We will give you free test for decrypt few files (NOT VALUE) and assign the price for decryption all files</p> After we send you instruction how to pay for decrypt tool and after payment you will receive a decrypt tool and instructions how to use it We can decrypt few files in quality the evidence that we have the decoder.</br> <hr color=red> <center><p style="color:#FF0000">MOST IMPORTANT!!!</p></center> <center><p style="color:#FF0000"> Do not contact other services that promise to decrypt your files, this is fraud on their part! They will buy a decoder from us, and you will pay more for his services. No one, except [email protected], will decrypt your files.</p></center> <hr color=red> <ul> <li>Only [email protected] can decrypt your files</li> <li>Do not trust anyone besides [email protected]</li> <li>Antivirus programs can delete this document and you can not contact us later.</li> <li>Attempts to self-decrypting files will result in the loss of your data</li> <li>Decoders other users are not compatible with your data, because each user's unique encryption key</li> </ul> <!--text data --> </div> </div> </div> <!--tab--> </ul> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html> ������������

Targets

    • Target

      2025-04-03_778ec99ed08d832a8bc2194744e8c12a_globeimposter

    • Size

      54KB

    • MD5

      778ec99ed08d832a8bc2194744e8c12a

    • SHA1

      ec359a3c19e321bf5c4b01ef7eb64dfcf5851d04

    • SHA256

      a47d52573f5db76b36f37a70290db75d684a914eb773dd102a726aa73deb4bf7

    • SHA512

      567c76792a6fcf18f17d430522d524128af8d102c183690afa8f291d50af608a2b53817bc410600165bd80a06d7338117e0302f137dc53d82e63d8268cd2938d

    • SSDEEP

      768:4itKvuye1kVtGBk6P/v7nWlHznbkVwrEKD9yDwxVSHrowNI2tG6o/t84B5HmbSZf:toeytM3alnawrRIwxVSHMweio3FzZAW

    • GlobeImposter

      GlobeImposter is a ransomware first seen in 2017.

    • Globeimposter family

    • Renames multiple (8998) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

MITRE ATT&CK Enterprise v15

Tasks