General
-
Target
4.exe
-
Size
211KB
-
Sample
230122-xzrbesbc4x
-
MD5
8f43f1fddbcf5409408eb618a981b23b
-
SHA1
3ff15167aa71fc29c7f3ee17fc5f482d8ecceaf2
-
SHA256
6656c50ffbdc59ce71b93474f43270dfeb42b57451724c25fa26f5bbf532e449
-
SHA512
3a6bca15442233f9b36e51ea984353925d43ac17326742ad8a562542ca20e99da0477b583b8cc415eb8ab09b306a6b903e7ee1d79137487312ab5327f8ac2387
-
SSDEEP
6144:+ia1gMH2EXtAup5Qnqn64DQFu/U3buRKlemZ9DnGAe+hsOn+8:+IMHxGe5Qb4DQFu/U3buRKlemZ9DnGAz
Behavioral task
behavioral1
Sample
4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
4.exe
-
Size
211KB
-
MD5
8f43f1fddbcf5409408eb618a981b23b
-
SHA1
3ff15167aa71fc29c7f3ee17fc5f482d8ecceaf2
-
SHA256
6656c50ffbdc59ce71b93474f43270dfeb42b57451724c25fa26f5bbf532e449
-
SHA512
3a6bca15442233f9b36e51ea984353925d43ac17326742ad8a562542ca20e99da0477b583b8cc415eb8ab09b306a6b903e7ee1d79137487312ab5327f8ac2387
-
SSDEEP
6144:+ia1gMH2EXtAup5Qnqn64DQFu/U3buRKlemZ9DnGAe+hsOn+8:+IMHxGe5Qb4DQFu/U3buRKlemZ9DnGAz
Score10/10-
Detects Zeppelin payload
-
Zeppelin Ransomware
Ransomware-as-a-service (RaaS) written in Delphi and first seen in 2019.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-