Home Malware Programs Ransomware Globe Ransomware

Globe Ransomware

Posted: August 24, 2016

Threat Metric

Ranking: 17,318
Threat Level: 10/10
Infected PCs: 116,199
First Seen: August 24, 2016
Last Seen: September 30, 2023
OS(es) Affected: Windows

The Globe Ransomware is a Trojan that uses the infected PC's files for enacting hostage-ransoming scenarios. Data is held hostage by an encryption attack that also may cause incidental damage to your installed programs or operating system. Taking any steps suitable for disabling the Trojan's attacks and using anti-malware programs to delete the Globe Ransomware automatically is the recovery strategy malware experts recommend, in contrast to the risk of paying its ransom.

The Other Dangers of a Blowfish Attack

In addition to being a toxic species of fish, security analysts also know of Blowfish as an alternative data ciphering algorithm. It maintains a high level of effectiveness against decryption efforts but is less common in usage than AES. The Globe Ransomware is one of the few samples of file-encrypting Trojans that malware experts can confirm as using Blowfish, which is unsuitable for large files notably (several gigabytes or more in size). However, the encryption technique's limitations do little to reduce the potential damages of a corrupted file-encrypting attack.

The Globe Ransomware uses English-based extortion communications but regionally appears to be targeting Central Asian nations, such as Afghanistan. Its payload includes two formats of ransom messages with slightly differing contents, one of which includes extra payment details, the other of which the Globe Ransomware locks to your desktop as its background. However, its primary attack and symptoms are related to encryption:

  • The Globe Ransomware uses the Blowfish cipher to modify the data of your files, encrypting them and stopping other programs from interpreting their contents correctly. Although Blowfish uses a much smaller block size compared to AES-256, it's equally viable for the practical purpose of preventing a PC's owner from accessing small documents, images, music and similar information. The attack may be re-initiated after the system restarts, causing increasingly more content to be attacked.
  • It also renames the enciphered content with the insertion of an e-mail address (as a means of ransom communications).
  • The Globe Ransomware also deletes local Windows backups (known as Shadow Copies) to deprive its victims of the most on-hand method of recovering any files.
  • Various Windows security and recovery features can become disabled, including Windows Startup Repair.

Smashing a the Globe of File-Encrypting Venom

The Globe Ransomware follows with many of the trends in file encryption Trojans today, including preferring Bitcoin ransoms, relying on e-mail messages heavily, and targeting narrow regions of the world. Although using Blowfish is a technically notable feature, this difference provides little hope of vulnerabilities that could help a victim recover encrypted content through free methods. PC owners that invested in their data always should take the proper steps for protecting it, including using backups out of the reach of Trojans like the Globe Ransomware.

When security software doesn't block it preemptively, the Globe Ransomware's symptoms are highly visible. Malware experts haven't confirmed evidence of its infection methods, which could include e-mail attachments, drive-by-downloads hosted in malvertising content, or 'brute force' attacks against poorly protected networks. All of these methods are blockable by standard security protocols that are less difficult than decrypting a Blowfish cipher significantly.

Between common security standards and having anti-malware equipment for removing the Globe Ransomware on sight, paying a con artist a fee to get your data back is the worst option available clearly.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%ALLUSERSPROFILE%\!!! READ THIS - IMPORTANT !!!.hta File name: !!! READ THIS - IMPORTANT !!!.hta
Size: 4.5 KB (4500 bytes)
MD5: 71b5bde6378a2a78890d0e97e68a509f
Detection count: 4,466
Mime Type: unknown/hta
Path: %ALLUSERSPROFILE%
Group: Malware file
Last Updated: April 14, 2017
%SystemDrive%\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\How to restore files.hta File name: How to restore files.hta
Size: 4.47 KB (4476 bytes)
MD5: 36e82400a1471d26845799b4e84e39e8
Detection count: 3,199
Mime Type: unknown/hta
Path: %SystemDrive%\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
Group: Malware file
Last Updated: May 16, 2017
%ALLUSERSPROFILE%\!!! READ THIS - IMPORTANT !!!.hta File name: !!! READ THIS - IMPORTANT !!!.hta
Size: 4.48 KB (4488 bytes)
MD5: 2b7bd31fd3447cd1b0e0bdfd690b0740
Detection count: 1,035
Mime Type: unknown/hta
Path: %ALLUSERSPROFILE%
Group: Malware file
Last Updated: August 23, 2017
%SystemDrive%\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\How to restore files.hta File name: How to restore files.hta
Size: 4.47 KB (4473 bytes)
MD5: b878021fc79732a224496a079368d3af
Detection count: 588
Mime Type: unknown/hta
Path: %SystemDrive%\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
Group: Malware file
Last Updated: August 23, 2017
%SystemDrive%\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\How to restore files.hta File name: How to restore files.hta
Size: 4.31 KB (4313 bytes)
MD5: e0ef5ddabbaeccbff633b2ae59761125
Detection count: 281
Mime Type: unknown/hta
Path: %SystemDrive%\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
Group: Malware file
Last Updated: August 23, 2017
%ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\Startup\How To Recover Encrypted Files.hta File name: How To Recover Encrypted Files.hta
Size: 4.07 KB (4073 bytes)
MD5: 553c06dcdcf8215e827e086932fdda9b
Detection count: 150
Mime Type: unknown/hta
Path: %ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\Startup
Group: Malware file
Last Updated: April 15, 2017
%SystemDrive%\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\How to restore files.hta File name: How to restore files.hta
Size: 4.47 KB (4476 bytes)
MD5: f8fb7de9e6631fb2282fd4b5cc0a6a39
Detection count: 129
Mime Type: unknown/hta
Path: %SystemDrive%\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
Group: Malware file
Last Updated: August 23, 2017
%SystemDrive%\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\How to restore files.hta File name: How to restore files.hta
Size: 4.31 KB (4313 bytes)
MD5: 876c0e750191be1b6bfbcaf08d4bcf29
Detection count: 110
Mime Type: unknown/hta
Path: %SystemDrive%\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
Group: Malware file
Last Updated: May 16, 2017
%SystemDrive%\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\How to restore files.hta File name: How to restore files.hta
Size: 4.01 KB (4014 bytes)
MD5: 503478dce7398eac1ce8cc7db0fea7b9
Detection count: 82
Mime Type: unknown/hta
Path: %SystemDrive%\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
Group: Malware file
Last Updated: August 23, 2017
%SystemDrive%\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\How to restore files.hta File name: How to restore files.hta
Size: 4.47 KB (4476 bytes)
MD5: 5bee874338372d37a1e90fa3066235fb
Detection count: 75
Mime Type: unknown/hta
Path: %SystemDrive%\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
Group: Malware file
Last Updated: May 16, 2017
%SystemDrive%\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\How to restore files.hta File name: How to restore files.hta
Size: 4.47 KB (4473 bytes)
MD5: ac9e4795b2c1256bbafa1f1ed1468ae0
Detection count: 56
Mime Type: unknown/hta
Path: %SystemDrive%\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
Group: Malware file
Last Updated: May 11, 2017
%SystemDrive%\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\How to restore files.hta File name: How to restore files.hta
Size: 4.31 KB (4313 bytes)
MD5: bb782e8deb0efc78549a1f5c44da0adc
Detection count: 56
Mime Type: unknown/hta
Path: %SystemDrive%\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
Group: Malware file
Last Updated: August 23, 2017
%LOCALAPPDATA%\How to restore files.hta File name: How to restore files.hta
Size: 4.47 KB (4476 bytes)
MD5: b5c01e1bd2b9b6fec75ad52bf06a1bab
Detection count: 56
Mime Type: unknown/hta
Path: %LOCALAPPDATA%
Group: Malware file
Last Updated: August 23, 2017
%SystemDrive%\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\How to restore files.hta File name: How to restore files.hta
Size: 4.47 KB (4476 bytes)
MD5: 95e3c291f18dcf4654c211a1d64a95c3
Detection count: 26
Mime Type: unknown/hta
Path: %SystemDrive%\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
Group: Malware file
Last Updated: August 23, 2017
%LOCALAPPDATA%\How to restore files.hta File name: How to restore files.hta
Size: 4.01 KB (4014 bytes)
MD5: 024074f49218168ffaf0d0f08db1add8
Detection count: 19
Mime Type: unknown/hta
Path: %LOCALAPPDATA%
Group: Malware file
Last Updated: August 23, 2017
file.exe File name: file.exe
Size: 28.95 KB (28952 bytes)
MD5: a464f7bc0431292d74ad66403efbf691
Detection count: 15
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%SystemDrive%\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\How to restore files.hta File name: How to restore files.hta
Size: 4.31 KB (4313 bytes)
MD5: e77da836d1a42580345a3825111af71a
Detection count: 7
Mime Type: unknown/hta
Path: %SystemDrive%\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
Group: Malware file
Last Updated: May 16, 2017
%SystemDrive%\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\How to restore files.hta File name: How to restore files.hta
Size: 4.31 KB (4313 bytes)
MD5: 9c0f010c33c9bd395602c8791f4ad080
Detection count: 7
Mime Type: unknown/hta
Path: %SystemDrive%\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
Group: Malware file
Last Updated: May 16, 2017
%SystemDrive%\Users\<username>\AppData\Local\How to restore files.hta File name: How to restore files.hta
Size: 4.47 KB (4476 bytes)
MD5: 0c8676762e22ed3a6cd59ce37068c30d
Detection count: 5
Mime Type: unknown/hta
Path: %SystemDrive%\Users\<username>\AppData\Local
Group: Malware file
Last Updated: August 23, 2017

More files

Registry Modifications

The following newly produced Registry Values are:

File name without pathHow To Recover Encrypted Files.htaHow To Recover Encrypted Files.htmlHow to restore files.htaHOW_OPEN_FILES.htaRead Me Please.htaHKEY..\..\..\..{RegistryKeys}Software\Microsoft\Windows\CurrentVersion\Run\How To Recover Encrypted Files

Related Posts

Loading...