General
-
Target
4aa0fef7356c18214f9c9bb3a9ea16cd.bin
-
Size
216KB
-
Sample
221208-j7q4qshd49
-
MD5
4aa0fef7356c18214f9c9bb3a9ea16cd
-
SHA1
92e655dbe599a3ecfc9c8f510ccc03f81185f660
-
SHA256
24efa10a2b51c5fd6e45da6babd4e797d9cae399be98941f950abf7b5e9a4cd7
-
SHA512
2c0cb5a6ecac3dde2fea800fdbb53f13f7b057216487cd9889218f7cf63b4b98cd6c3ba4cd1866d8cf9ed52b0a5b8a0da971566fa4e26ecebf119da1048f9c10
-
SSDEEP
6144:uyJE1yd7WWlJmcyfwAPWna4DQFu/U3buRKlemZ9DnGAevIGcF7+:uU/d7WWKvhPWa4DQFu/U3buRKlemZ9Dh
Behavioral task
behavioral1
Sample
4aa0fef7356c18214f9c9bb3a9ea16cd.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4aa0fef7356c18214f9c9bb3a9ea16cd.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
http://vsociethok6sbprvevl4dlwbqrzyhxcxaqpvcqt5belwvsuxaxsutyad.onion
Targets
-
-
Target
4aa0fef7356c18214f9c9bb3a9ea16cd.bin
-
Size
216KB
-
MD5
4aa0fef7356c18214f9c9bb3a9ea16cd
-
SHA1
92e655dbe599a3ecfc9c8f510ccc03f81185f660
-
SHA256
24efa10a2b51c5fd6e45da6babd4e797d9cae399be98941f950abf7b5e9a4cd7
-
SHA512
2c0cb5a6ecac3dde2fea800fdbb53f13f7b057216487cd9889218f7cf63b4b98cd6c3ba4cd1866d8cf9ed52b0a5b8a0da971566fa4e26ecebf119da1048f9c10
-
SSDEEP
6144:uyJE1yd7WWlJmcyfwAPWna4DQFu/U3buRKlemZ9DnGAevIGcF7+:uU/d7WWKvhPWa4DQFu/U3buRKlemZ9Dh
Score10/10-
Detects Zeppelin payload
-
Zeppelin Ransomware
Ransomware-as-a-service (RaaS) written in Delphi and first seen in 2019.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-