General

  • Target

    2025-04-06_d300c5d370745a32482f219a648ac31d_globeimposter

  • Size

    53KB

  • Sample

    250406-bj35dsyxfy

  • MD5

    d300c5d370745a32482f219a648ac31d

  • SHA1

    8baafcb6352ace7ed695ba3c34e3e5f1d0e1d8f9

  • SHA256

    d28fff7a3d103c867d7b0bff60e10e9630753c81fcc26647f56429cd7a8eb3d1

  • SHA512

    d1f037f26fb5970be60a03736fd1f2ae4ecedaf1dd4df21ab0a6cfdc873d67f79f57f1d0335a6b3d933eb88a61ee8d68dcd5d4d66f41e63470a32ccffe3127b6

  • SSDEEP

    768:esihjk9hlg4tBLuZuZJHe4ndXxnWlHznD/VwrEQYtqVi6S9JWvZ/KWwhQMNzLmpJ:YjkfV+KJolntwrbDSTWvTwhQMhmpdLGo

Malware Config

Targets

    • Target

      2025-04-06_d300c5d370745a32482f219a648ac31d_globeimposter

    • Size

      53KB

    • MD5

      d300c5d370745a32482f219a648ac31d

    • SHA1

      8baafcb6352ace7ed695ba3c34e3e5f1d0e1d8f9

    • SHA256

      d28fff7a3d103c867d7b0bff60e10e9630753c81fcc26647f56429cd7a8eb3d1

    • SHA512

      d1f037f26fb5970be60a03736fd1f2ae4ecedaf1dd4df21ab0a6cfdc873d67f79f57f1d0335a6b3d933eb88a61ee8d68dcd5d4d66f41e63470a32ccffe3127b6

    • SSDEEP

      768:esihjk9hlg4tBLuZuZJHe4ndXxnWlHznD/VwrEQYtqVi6S9JWvZ/KWwhQMNzLmpJ:YjkfV+KJolntwrbDSTWvTwhQMhmpdLGo

    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • Locky family

    • Renames multiple (8524) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks