General

  • Target

    4.exe

  • Size

    211KB

  • Sample

    230122-xzrbesbc4x

  • MD5

    8f43f1fddbcf5409408eb618a981b23b

  • SHA1

    3ff15167aa71fc29c7f3ee17fc5f482d8ecceaf2

  • SHA256

    6656c50ffbdc59ce71b93474f43270dfeb42b57451724c25fa26f5bbf532e449

  • SHA512

    3a6bca15442233f9b36e51ea984353925d43ac17326742ad8a562542ca20e99da0477b583b8cc415eb8ab09b306a6b903e7ee1d79137487312ab5327f8ac2387

  • SSDEEP

    6144:+ia1gMH2EXtAup5Qnqn64DQFu/U3buRKlemZ9DnGAe+hsOn+8:+IMHxGe5Qb4DQFu/U3buRKlemZ9DnGAz

Malware Config

Targets

    • Target

      4.exe

    • Size

      211KB

    • MD5

      8f43f1fddbcf5409408eb618a981b23b

    • SHA1

      3ff15167aa71fc29c7f3ee17fc5f482d8ecceaf2

    • SHA256

      6656c50ffbdc59ce71b93474f43270dfeb42b57451724c25fa26f5bbf532e449

    • SHA512

      3a6bca15442233f9b36e51ea984353925d43ac17326742ad8a562542ca20e99da0477b583b8cc415eb8ab09b306a6b903e7ee1d79137487312ab5327f8ac2387

    • SSDEEP

      6144:+ia1gMH2EXtAup5Qnqn64DQFu/U3buRKlemZ9DnGAe+hsOn+8:+IMHxGe5Qb4DQFu/U3buRKlemZ9DnGAz

    • Detects Zeppelin payload

    • Zeppelin Ransomware

      Ransomware-as-a-service (RaaS) written in Delphi and first seen in 2019.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks