[Studying] Analyzing GlobeImposter 2018

First Post:

Last Update:

Word Count:
861

Read Time:
5 min

Introduction

This article is part of my series: Inside Different Generations of Ransomware.

If you are interested in the full series, please refer to the mentioned page.

This article presents a reverse engineering analysis of GlobeImposter (aka LOLKEK), focusing on its encryption mechanism, persistence, and anti-forensics behavior.

Compared to WannaCry, GlobeImposter demonstrates a simpler but more human-operated attack model.

Key Takeaways

  • No worming module
  • Manual propagation via RDP brute force or social engineering
  • Embedded AES implementation (no APIs used for AES)
  • Dynamically generated encrypted artifacts (harder for static analysis)

GlobeImposter

GlobeImposter ransomware has been active since 2016 and is typically distributed via phishing emails and RDP brute force attacks.

The name “GlobeImposter” comes from its attempt to mimic Globe ransomware payloads.

According to researchers, this malware may disable anti-virus solutions and other OS security features, and may also prevent system restoration. 1 2

The GlobeImposter family contains multiple variants. Unlike WannaCry, some variants are more destructive, as they also encrypt *.exe and *.dll files.

Unlike worm-based ransomware, GlobeImposter follows a human-driven intrusion model, relying on RDP brute force and social engineering rather than automated propagation.

Experimental Environment

To safely conduct malware analysis, the environment should be isolated using virtual machines. Under no circumstances should malware be executed on a personal or production system.

Tool Description
ExeInfo PE Detect packers, compilers, and basic file metadata
Detect It Easy (DIE) Identify packers, protectors, and signatures
Wireshark Network traffic analysis
Ghidra Software reverse engineering framework

Device IP Address Description
Windows 7 x64 (VM) 192.168.85.5 Victim machine
Windows 10 x64 (VM) 192.168.85.3 Analysis machine

The two virtual machines were configured within an isolated internal network to prevent unintended external communication. If you want to know how to set up your experimental environment, please view:

Launch

Note: I found two variants on the internet, one released in 2018 and another in 2021. For convenience, I use the name “the version 2018” and “the version 2021” in this article.

Version 2018

Extortion message

Version 2021

Extortion message

Unlike WannaCry, GlobeImposter does not include a worming module. It is manually propagated after a successful RDP brute force attack or social engineering (e.g., phishing email).

Reverse Engineering

Note: This article focuses on the 2018 version. The 2021 version will be analyzed in a future article since it is much more complex than this version.
Update: GlobeImposter 2021

Information of the version 2018:

  • Language: Visual C++
  • Compiler timestamp: Mon Apr 02 16:47:20 2018 (UTC)
  • SHA256: 750984dff0d13260e17e9bb1a3482f1bae834d6e0de1bcd199028748a9f998dc

Open the malware using ExeInfo PE and DIE (Detect It Easy). Both tools confirmed that the malware is not packed:

ExeInfo PE

DIE

DIE — Entropy

Open the malware using Ghidra.

Modify registry to maintain persistence:

FUN_RegPersistence

Scan all available drives:

Note: For readability, I renamed some functions based on their functionality

Scan files:

Thread_FileScanner

Instead of relying on standard cryptographic APIs, the malware implements AES internally.

This design reduces visibility from API-based monitoring and makes static detection more difficult, as typical cryptographic imports are absent.

AES encryption algorithm

In addition, the malware dynamically constructs a file extension for each encrypted file using the encrypted keyword. Therefore, these keywords cannot be located via static analysis methods.

Dynamically construct the file extension

Since GlobeImposter is installed by attackers after RDP brute force succeeds, the RDP login log file will be removed once the malware is successfully executed.

Much of the embedded data is encrypted. Therefore, I used x32dbg to validate my hypothesis.

Note: I am going to perform dynamic analysis via x32dbg. Since ransomware might encrypt your analysis result (e.g., Ghidra files), it is better to take a snapshot on the virtual machine to save your time!

Save cmd commands into a batch file:

The content of the batch file is shown below:

Eventually, the malware removes itself:

This malware does not create a temporary file for every file encryption. This behavior increases the difficulty of digital forensics, as fewer artifacts are left on disk during encryption.

Conclusion

This article presents an analysis of one of the variants of GlobeImposter which was released in 2018. The overall kill chain is shown below:

flowchart TD F["Infect via RDP brute force/social engineering"] A["Malware start"] B["Persistence"] C["Encryption"] D["Remove RDP logs"] E["Self-Delete"] G["Ransom"] F --> A --> B --> C --> G --> D --> E

From a research perspective, GlobeImposter highlights an alternative evolution path of ransomware.

Instead of increasing exploitation sophistication (as seen in WannaCry), it focuses on human-assisted intrusion (RDP brute force).

This suggests that ransomware does not always evolve toward automation, but may instead prioritize operational stealth and flexibility.

As mentioned in the last section, the version 2021 is much more complicated than this version, especially in evasion. Therefore, the analysis will be presented in the next article.

Update: GlobeImposter 2021

If you have any comments or suggestions, please feel free to leave them below!

References

1. https://www.sentinelone.com/anthology/globeimposter/
2. https://malpedia.caad.fkie.fraunhofer.de/details/win.globeimposter

THANKS FOR READING