Globe3 Ransomware
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Ranking: | 16,940 |
Threat Level: | 100 % (High) |
Infected Computers: | 49,612 |
First Seen: | August 24, 2016 |
Last Seen: | July 9, 2023 |
OS(es) Affected: | Windows |
The Globe3 Ransomware is a variant in the Globe Ransomware family that is themed after the popular movie 'The Purge.' The Globe3 Ransomware uses a ransom note, and Desktop picture themed after this movie and appends the extension '.purge' to each file affected during the attack. The Globe3 Ransomware is a typical encryption ransomware variant. The Globe3 Ransomware encrypts the victims' files using a strong encryption method. The Globe3 Ransomware then displays a ransom note that demands that the victim pays a large sum in exchange for the decryption key needed to recover the affected files. Fortunately, PC security analysts have released a decryption utility that can help computer users recover their files after a the Globe3 Ransomware infection.
Table of Contents
The Globe3 Ransomware is Another Member of Its Ever-Growing Family
It is likely that the Globe3 Ransomware spreads using spam email attachments. Once the Globe3 Ransomware infects a computer, it first ensures that it is not running on a virtual machine or sandbox environment, used by PC security researchers to test and examine threats in a controlled environment. Once the Globe3 Ransomware determines that it is running on a non-sandbox operating system, it begins its attack, encrypting files on local drives, shared network folders, and external memory devices connected to the infected computer. The Globe3 Ransomware targets nearly one thousand different file types, searching for files that match a list of file extensions in its configuration settings and encrypting them using the Blowfish encryption. After encrypting a file, the Globe3 Ransomware adds the extension '.purge' to the end of the file's name, making it simple to know which files have been affected by the attack.
The Globe3 Ransomware’s Ransom Note
The Globe3 Ransomware delivers its ransom note in an HTA file named 'How to restore files.hta' dropped in most directories where files were encrypted. The Globe3 Ransomware changes the affected computer's settings to allow the HTA file to run automatically when Windows starts up. The Globe3 Ransomware's ransom note includes an ID for the infected computer and the Globe3 Ransomware's creator's email address. Below is the full text of the Globe3 Ransomware ransom note:
'Your files are encrypted!
Your personal ID
{{IDENTIFIER}}
Your documents, photos, databases, save games and other important data has been encrypted.
Data recovery is required interpreter.
To get the interpreter should pay its costs: 3 Bitcoin (3 BTC).
Cash must be translated into Bitcoin-purse: 18XXV3h9zzzJ1R4v6DiGmfgcooG1Vk9B1m
If you have no Bitcoin
Create a wallet Bitcoin: https://blockchain.info/ru/wallet/new
Get cryptocurrency Bitcoin:
https://localbitcoins.com/ru/buy_bitcoins (Visa/MasterCard, QIWI Visa Wallet \xE8 \xE4\xF0.)
https://ru.bitcoin.it/wiki/\xCF\xF0\xE8\xEE\xE1\xF0\xE5\xF2\xE5\xED\xE8\xE5_\xE1\xE8\xF2\xEA\xEE\xE9\xED\xEE\xE2(instruction for beginners)
Send 3 BTC bitcoin address 18XXV3h9zzzJ1R4v6DiGmfgcooG1Vk9B1m
After the payment, send an e-mail address decrypt2017@india.com. In a letter to indicate your personal identifier.
In a response letter you will receive a program to decrypt.
After start-interpreter program, all your files will be restored.
Attention!
Do not attempt to remove the program or run the anti-virus tools
Attempts to self-decrypting files will result in the loss of your data
Decoders are not compatible with other users of your data because each user's unique encryption key.'
Apart from the ransom note, the Globe3 Ransomware will change the infected computer's Desktop image so that it displays characters from 'The Purge: Election Year,' as well as the message 'You files are encrypted. Pay for decryption please' and the email address powerbase@tutanota.com.
Dealing with the Globe3 Ransomware
Oddly enough, the Globe3 Ransomware includes a debug mode that has helped PC security analysts study how the Globe3 Ransomware works. This has allowed PC security analysts to release a decryption utility to help computer users deal with the Globe3 Ransomware. The decryptor has been confirmed with the Globe3 Ransomware variants that use the extensions .decrypt2017 and .hnumkhotep to identify the encrypted files. However, it is very likely that this decryption utility will work with other variants of the Globe3 Ransomware. PC security analysts advise computer users to ensure that backups of all files are maintained to mitigate the damage of any future ransomware attacks, especially those involving threats for which no decryption utility is available.
SpyHunter Detects & Remove Globe3 Ransomware

File System Details
# | File Name | MD5 |
Detections
Detections: The number of confirmed and suspected cases of a particular threat detected on
infected computers as reported by SpyHunter.
|
---|---|---|---|
1. | !!! READ THIS - IMPORTANT !!!.hta | 71b5bde6378a2a78890d0e97e68a509f | 1,907 |
2. | How to restore files.hta | 36e82400a1471d26845799b4e84e39e8 | 1,366 |
3. | !!! READ THIS - IMPORTANT !!!.hta | 2b7bd31fd3447cd1b0e0bdfd690b0740 | 442 |
4. | How to restore files.hta | b878021fc79732a224496a079368d3af | 251 |
5. | How to restore files.hta | e0ef5ddabbaeccbff633b2ae59761125 | 120 |
6. | !!! READ THIS - IMPORTANT !!!.hta | b1ced26e230b558f632f154388a28206 | 95 |
7. | How To Recover Encrypted Files.hta | 553c06dcdcf8215e827e086932fdda9b | 64 |
8. | How to restore files.hta | f8fb7de9e6631fb2282fd4b5cc0a6a39 | 55 |
9. | How to restore files.hta | 876c0e750191be1b6bfbcaf08d4bcf29 | 47 |
10. | How to restore files.hta | 5bee874338372d37a1e90fa3066235fb | 32 |
11. | How to restore files.hta | b6e7a3d306ec4dae355cfefc506c3d46 | 31 |
12. | How to restore files.hta | b9a236156344554fa06377d84b702a68 | 25 |
13. | How to restore files.hta | ac9e4795b2c1256bbafa1f1ed1468ae0 | 24 |
14. | How to restore files.hta | bb782e8deb0efc78549a1f5c44da0adc | 24 |
15. | How to restore files.hta | 89f48f5403dd8daa9adeccb6dc04c30f | 24 |
16. | How to restore files.hta | b5c01e1bd2b9b6fec75ad52bf06a1bab | 24 |
17. | How to restore files.hta | 11370076a57e9ef6820cbe4890e36681 | 24 |
18. | How to restore files.hta | c9984b49079e115c03facb65cd4a44a3 | 16 |
19. | How to restore files.hta | 95e3c291f18dcf4654c211a1d64a95c3 | 11 |
20. | How to restore files.hta | 024074f49218168ffaf0d0f08db1add8 | 8 |
21. | How to restore files.hta | e77da836d1a42580345a3825111af71a | 3 |
22. | How to restore files.hta | 9c0f010c33c9bd395602c8791f4ad080 | 3 |
23. | How to restore files.hta | 515391c5bd9e804a71720fe80ad12813 | 3 |
24. | How to restore files.hta | 0c8676762e22ed3a6cd59ce37068c30d | 2 |
25. | How to restore files.hta | 503478dce7398eac1ce8cc7db0fea7b9 | 1 |
26. | file.exe | a464f7bc0431292d74ad66403efbf691 | 0 |
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.