2017-12-04 - NECURS BOTNET MALSPAM PUSHES GLOBEIMPOSTER RANSOMWARE

NOTICE:

ASSOCIATED FILES:

 

NOTES:

 

WEB TRAFFIC BLOCK LIST

Indicators are not a block list.  If you feel the need to block web traffic, I suggest the following domains and URLs:

 

IMAGES


Shown above:  Example of an email from the 1st wave of malspam.

 


Shown above:  Example of an email from the 2nd wave of malspam.

 


Shown above:  One of the attached 7-zip archives and extracted VBS file.

 


Shown above:  Traffic from an infection filtered in Wireshark.

 


Shown above:  Example of the HTTP GET request for the GlobeImposter ransomware binary.

 


Shown above:  Examples of encrypted files on an infected Windows host.

 


Shown above:  Decryption instructions from the HTML file dropped on the infected Windows host.

 


Shown above:  GlobeImposter decryptor shows ransom payment as 0.088 Bitcoin (trying for $1,000 US).

 


Shown above:  Artifact found in the user's AppData\Local\Temp directory.

 

INDICATORS

EMAIL DATA FROM 10 EXAMPLES:

 

SHA256 HASHES FOR THE ATTACHMENTS

 

SHA256 HASHES FOR THE EXTRACTED VBS FILES:

 

URLS FROM THE VBS FILES TO RETRIEVE GLOBEIMPOSTER RANSOMWARE:

 

POST-INFECTION TRAFFIC AFTER RUNNING A VBS FILE/CHECKING DECRYPTION INSTRUCTIONS:

 

GLOBEIMPOSTER RANSOMWARE EXECUTABLE:

 

OTHER INFORMATION:

 

Click here to return to the main page.