General
-
Target
8090cb9a98392d753116e30e0be9f25a.bin
-
Size
216KB
-
Sample
221208-m13qqshg38
-
MD5
8090cb9a98392d753116e30e0be9f25a
-
SHA1
1f45a5e3dc88e363fd6ff83d52a6a2e4ddd8951f
-
SHA256
ab440c4391ea3a01bebbb651c80c27847b58ac928b32d73ed3b19a0b17dd7e75
-
SHA512
dede19a2dd8c314617c448ad785e24b511f76eecd4dcc40b1ce2a034ef57a536fc0c6f74209685f73219974b200008b1d4127783ea5738e07b2306e13db6f7dd
-
SSDEEP
6144:UyJE1yd7WWlJmcyfwAPWna4DQFu/U3buRKlemZ9DnGAevIGS+:UU/d7WWKvhPWa4DQFu/U3buRKlemZ9DG
Behavioral task
behavioral1
Sample
8090cb9a98392d753116e30e0be9f25a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8090cb9a98392d753116e30e0be9f25a.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
http://vsociethok6sbprvevl4dlwbqrzyhxcxaqpvcqt5belwvsuxaxsutyad.onion
Targets
-
-
Target
8090cb9a98392d753116e30e0be9f25a.bin
-
Size
216KB
-
MD5
8090cb9a98392d753116e30e0be9f25a
-
SHA1
1f45a5e3dc88e363fd6ff83d52a6a2e4ddd8951f
-
SHA256
ab440c4391ea3a01bebbb651c80c27847b58ac928b32d73ed3b19a0b17dd7e75
-
SHA512
dede19a2dd8c314617c448ad785e24b511f76eecd4dcc40b1ce2a034ef57a536fc0c6f74209685f73219974b200008b1d4127783ea5738e07b2306e13db6f7dd
-
SSDEEP
6144:UyJE1yd7WWlJmcyfwAPWna4DQFu/U3buRKlemZ9DnGAevIGS+:UU/d7WWKvhPWa4DQFu/U3buRKlemZ9DG
Score10/10-
Detects Zeppelin payload
-
Zeppelin Ransomware
Ransomware-as-a-service (RaaS) written in Delphi and first seen in 2019.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-