General
-
Target
8015716177.zip
-
Size
124KB
-
Sample
220926-whltyacfgn
-
MD5
df75ac92ce6f775ff84bc49218719923
-
SHA1
c859da5eed877cf89c6eaf15808282471b34a121
-
SHA256
c1e2b767b92ac6b08f82da3bee833ca3fa3aeeeeab1f4301f8c18e8e68068b81
-
SHA512
a49e74c0e7ca60cae7caf3425f7661b0874120196c59acc248634f4f9424ea5e725b46252df0c730ba42e5700229f9e049cb1ba0e80f6bfa5716f7858d131a5b
-
SSDEEP
3072:fcyrCo9joXE1ijHFgU6Juiu58zLqqMY8Vpa/D02q:fcsCopoES56JKUqqKp++
Behavioral task
behavioral1
Sample
8ab79654152668be2c10be9cb17d941685e7733628dd7d38d6979516a75682ee.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8ab79654152668be2c10be9cb17d941685e7733628dd7d38d6979516a75682ee.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\Users\Public\Desktop\HOW_TO_RECOVER_DATA.hta
Targets
-
-
Target
8ab79654152668be2c10be9cb17d941685e7733628dd7d38d6979516a75682ee
-
Size
218KB
-
MD5
b8845a76e3942ff4d20ba4660ae926bb
-
SHA1
eb90f945087c270a2ecc11753180ba4ecc270696
-
SHA256
8ab79654152668be2c10be9cb17d941685e7733628dd7d38d6979516a75682ee
-
SHA512
9e2eda3dfe3bbdf149707eefe67d889fc88e0aa45ae23023367a8914b8feabd1badb043dfb5f8301541d4489d31b79164380a5ac8031662156c639008c26c4fc
-
SSDEEP
6144:aC61i972rJmciP98f2H64DQFu/U3buRKlemZ9DnGAe/Ix3Sd7+:aK972I/Gf2a4DQFu/U3buRKlemZ9DnG9
Score10/10-
Detects Zeppelin payload
-
Zeppelin Ransomware
Ransomware-as-a-service (RaaS) written in Delphi and first seen in 2019.
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-