GoodMorning Ransomware is a Threat Despite Strange Name
During the examination of new malware samples, we identified a variant of the GlobeImposter ransomware family, named GoodMorning. Once infiltrating a system, GoodMorning commences the encryption of files and appends the ".goodmorning" extension to filenames. It also generates a ransom note named "how_to_back_files.html."
To illustrate the file renaming process, GoodMorning alters filenames such as "1.jpg" to "1.jpg.goodmorning" and "2.png" to "2.png.goodmorning."
The ransom note declares that all crucial data has undergone encryption and can only be restored through a decryptor. It demands a payment of 1.5 BTC for decryption, specifying that this amount covers all computers and servers within the corporate network.
Instructions are provided for purchasing Bitcoin from reputable platforms like Binance or Coinbase and sending the payment to a specific BTC wallet, which will be disclosed after contacting the attackers. Deviating from these instructions is emphasized as it may result in a loss of funds.
Contact details include a ToxID and a link for downloading TOXChat. The note warns that failure to make the payment will lead to the corporate files and databases being either sold to third parties or publicly disclosed.
GoodMorning Ransom Note
The full text of the GoodMorning ransom note reads as follows:
YOUR PERSONAL ID
ENGLISH
ALL YOUR IMPORTANT DATA HAS BEEN ENCRYPTED.TO RESTORE FILES YOU WILL NEED A DECRYPTOR!
To get the decryptor you should:Pay for decrypt your network 1.5 BTC ( this is price for all PC/Servers in your corporate NetWork ! )
Buy BTC on one of these sites
hxxps://binance.com
hxxps://www.coinbase.com
Any site you trustBTC Wallet for pay: 3Disq313 (full wallet ask from support) !Attention! to payout wallet specifically for your company must begin with and finish with symbols indicated above, if you are offered any other wallet - know it's not us, but someone else! do not pay anything- you just lose money.
Our contact:
ToxID: CA04B61C320C50D12A2C1B95B506247 4B5C00B995B588D0B3781DC052CBF9A354CD10F96C84D
You can download TOXChat here : hxxps://tox.chat/download.html
The message must contain your Personal ID! it is at top of this document.
Also, your corporate files and databases have been stolen from your network. In case of non-payment, we reserve the right to sell them to third parties or publish them in public resouses.
HOW IT WORKS:
In case of non-payment, we organize an auction on various sites in DarkNet and try to sell files leaked from your network to interested parties.
Next, we use mail + any other contacts of your clients, and notify them of what happened, perhaps they will be interested so that information does not get into public domain and will be ready to buy out information separately.
If there are no buyers willing to buy, we simply publish everything that we have in public resources.Attention!
If you need a decrypter or return information, please contact us directly, avoid communicating with helper-services, they often take money and do not send it to us, assuring customers that deal failed through no fault of theirs. At same time, leaving money to yourself, and client is informed that money were transferred to us. The guarantee of a successful deals is only a direct contact! If you decide to negotiate not own - we can request confirmation of the negotiator's authority directly from the company. Please do not ignore these requests - otherwise negotiations will reach an impasse and problem not will be resolved. Don't shy… It's just business for us and we are always ready for polite and mutually beneficial communication.
How is Ransomware Similar to GoodMorning Distributed?
The distribution of Ransomware, including the GoodMorning variant, often shares similarities in various tactics and techniques. Here are some common distribution methods:
Phishing Emails:
Ransomware is frequently distributed through phishing emails that contain malicious attachments or links. Users may be tricked into opening an attachment, which then executes the ransomware on their system. The email may appear legitimate, often impersonating a trusted entity.
Malicious Websites:
Visiting compromised or malicious websites can lead to the automatic download and execution of ransomware. This can occur through drive-by downloads, where malware is downloaded without the user's knowledge or consent.
Exploit Kits:
Exploit kits target vulnerabilities in software, often in outdated applications or browsers. When a user visits a compromised website, the exploit kit scans for vulnerabilities and delivers the ransomware payload to exploit these weaknesses.
Malvertising:
Malicious advertisements, or malvertising, can deliver ransomware when users click on compromised ads on legitimate websites. These ads may lead users to websites that host exploit kits or initiate the download of ransomware directly.
Drive-by Downloads:
Ransomware can be delivered through drive-by downloads when a user visits a compromised or malicious website. The malware is automatically downloaded and executed without the user's knowledge.








