{
	"id": "abc5a026-955a-4189-801c-485577fbc414",
	"created_at": "2026-04-06T00:21:19.73506Z",
	"updated_at": "2026-04-10T03:24:30.219417Z",
	"deleted_at": null,
	"sha1_hash": "0c6bc265387ac9153320186bfe2d837ba1e7a355",
	"title": "Ransom.GlobeImposter",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 957651,
	"plain_text": "Ransom.GlobeImposter\r\nArchived: 2026-04-05 19:58:06 UTC\r\nShort bio\r\nRansom.GlobeImposter is a ransomware application that will encrypt files on a victim machine and demand\r\npayment to retrieve the information. Ransom.GlobeImposter is also known as Fake Globe due to how the software\r\nmimics the Globe ransomware family . Ransom.GlobeImposter may be distributed through a malicious spam\r\ncampaign, recognizable only with their lack of message content and an attached ZIP file. This type of spam is\r\ncalled a “blank slate.” Ransom.GlobeImposter is also distributed via exploits and malicious advertising, fake\r\nupdates, and repacked infected installers.\r\nSymptoms\r\nRansom.GlobeImposter may run silently in the background during the encryption phase and not provide any\r\nindication of infection to the user. Ransom.GlobeImposter may prevent the execution of Antivirus programs and\r\nother Microsoft Windows security features and may prevent system restoration as a means to solicit payment.\r\nRansom.Cryptomix may display a warning after successful encryption of the victim machine.\r\nType and source of infection\r\nhttps://blog.malwarebytes.com/detections/ransom-globeimposter/\r\nPage 1 of 4\n\nRansom.GlobeImposter may be distributed using various methods. This software may be packaged with free\r\nonline software, or could be disguised as a harmless program and distributed by email. Alternatively, this software\r\nmay be installed by websites using software vulnerabilities. Infections that occur in this manner are usually silent\r\nand happen without user knowledge or consent.\r\nAftermath\r\nSystems affected by ransomware are rendered unusable due to files that are typically used for regular operations\r\nbeing encrypted.Affected users who choose to pay the threat actors behind ransomware campaigns in exchange for\r\naccess to data may find that they don’t get their files back. There is also no sure way to know that threat actors\r\nwill honor their end of the deal after paying the ransom.Affected users who chose to pay the threat actors may also\r\nfind themselves likely targets for future ransomware campaigns.Data held hostage that wasn’t given back to users\r\nor deleted after the ransom has been paid can be used by threat actors either to (a) sell on the black market or (b)\r\ncreate a profile of the user they can use for fraud.\r\nProtection\r\nMalwarebytes protects users from the installation of Ransom.GlobeImposter.\r\nBusiness remediation\r\nMalwarebytes can detect and remove Ransom.GlobeImposter on business machines without further user\r\ninteraction.To remove Ransom.GlobeImposter using Malwarebytes business products, follow the instructions\r\nbelow.\r\nHow to remove Ransom.GlobeImposter with Malwarebytes Endpoint Protection\r\n1. Go to the Malwarebytes Cloud console.\r\n2. To allow you to invoke a scan while the machine is off the network, go to Settings\u003e Policies\u003e your\r\npolicy\u003e General.\r\n3. Under Endpoint Interface Options, turn ON:\r\nhttps://blog.malwarebytes.com/detections/ransom-globeimposter/\r\nPage 2 of 4\n\n1. Show Malwarebytes icon in notification area\r\n2. Allow users to run a Threat Scan (all threats will be quarantined automatically)\r\n4. Temporarily enable Anti-Rootkit scanning for all invoked threat scans.Go to Settings\u003e Policies\u003e your\r\npolicy\u003e Endpoint Protection\u003e Scan Options\r\n5. Set Scan Rootkitsto ON.\r\n6. Once the endpoint has been updated with the latest policy changes:\r\n1. Take the client off the network\r\n2. From the system tray icon, run an Anti-Rootkit threat scan.\r\nIf you have infected machines that are not registered endpoints in Malwarebytes Endpoint Protection, you can\r\nremove Ransom.GlobeImposter with our Breach Remediation tool (MBBR).\r\n1. Log into your My Account pageand copy your license key. The key is needed to activate MBBR tool.\r\n2. Open your Cloud console.\r\n3. From a clean and safe machine, go to Endpoints \u003e Add \u003e Malwarebytes Breach Remediation.This will\r\ndownload the MBBR zip package.\r\n4. Unzip the package.\r\n5. Access a Windows command line prompt and issue the following commands:mbbr register –key:mbbr\r\nupdateNote: You must substitute your license key for .\r\n6. Copy the MBBR folder to a flash drive.\r\n7. From an infected, offline machine, copy the MBBR folder from the flash drive.\r\n8. Start a scan using the following command:mbbr scan –full –ark –remove –noreboot\r\n9. Refer to the Malwarebytes Breach Remediation Windows Administrator Guidefor all supported scanning\r\ncommands.\r\nRemediation\r\nMalwarebytes can detect and remove Ransom.GlobeImposter without further user interaction.\r\n1. Please download Malwarebytesto your desktop.\r\n2. Double-click MBSetup.exeand follow the prompts to install the program.\r\n3. When your Malwarebytes for Windowsinstallation completes, the program opens to the Welcome to\r\nMalwarebytes screen.\r\n4. Click on the Get started button.\r\n5. Click Scan to start a Threat Scan.\r\n6. Click Quarantineto remove the found threats.\r\n7. Reboot the system if prompted to complete the removal process.\r\nhttps://blog.malwarebytes.com/detections/ransom-globeimposter/\r\nPage 3 of 4\n\nTake note, however, that removing this ransomware does not decrypt your files. You can only get your files back\r\nfrom backups you made before the infection happened.\r\nTraces/IOCs\r\nRansom file extensions\r\n.402 .fuck .scorp\r\n.4035 .goro .sea\r\n.4090 .gotham .skunk\r\n.4091 .granny .Trump\r\n.452 .happ .txt\r\n.707 .Ipcrestore .UNLIS\r\n.725 .keepcalm .vdul\r\n.726 .LIN .wallet\r\n.911 .MAKB .write_me_[email]\r\n.f41o1 .medal .write_on_email\r\n.2cXpCihgsVxB3 .mtk118 .write_us_on_email\r\n.3ncrypt3d .needdecrypt .YAYA\r\n.au1crypt .needkeys .zuzya\r\n.BONUM .NIGGA ..doc\r\n.BRT92 .nWcrypt .encencenc\r\n.BUSH .paycyka .{email@aol.com}BIT\r\n.C8B089F .pizdec .[email@cock.li].arena\r\n.CHAK .pscrypt .lock\r\n.clinTON .ReaGAN .Nutella\r\n.crypt .rumblegoodboy .waiting4keys\r\n.FIX .s1crypt .FREEMAN\r\nSource: https://blog.malwarebytes.com/detections/ransom-globeimposter/\r\nhttps://blog.malwarebytes.com/detections/ransom-globeimposter/\r\nPage 4 of 4",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://blog.malwarebytes.com/detections/ransom-globeimposter/"
	],
	"report_names": [
		"ransom-globeimposter"
	],
	"threat_actors": [
		{
			"id": "aa73cd6a-868c-4ae4-a5b2-7cb2c5ad1e9d",
			"created_at": "2022-10-25T16:07:24.139848Z",
			"updated_at": "2026-04-10T02:00:04.878798Z",
			"deleted_at": null,
			"main_name": "Safe",
			"aliases": [],
			"source_name": "ETDA:Safe",
			"tools": [
				"DebugView",
				"LZ77",
				"OpenDoc",
				"SafeDisk",
				"TypeConfig",
				"UPXShell",
				"UsbDoc",
				"UsbExe"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775434879,
	"ts_updated_at": 1775791470,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/0c6bc265387ac9153320186bfe2d837ba1e7a355.pdf",
		"text": "https://archive.orkl.eu/0c6bc265387ac9153320186bfe2d837ba1e7a355.txt",
		"img": "https://archive.orkl.eu/0c6bc265387ac9153320186bfe2d837ba1e7a355.jpg"
	}
}