General
-
Target
3145cd124db5c8c34e053aea87694baa_zeppelin_JC.exe
-
Size
225KB
-
Sample
230801-t8c9daag21
-
MD5
3145cd124db5c8c34e053aea87694baa
-
SHA1
5645f85669b81b82936a821900425046a511dc8d
-
SHA256
52e8721e17365eb4281908df3ffbe6920ad0da496ec7b6288812e564002801b7
-
SHA512
a180166e2cc56ec429e7edfee7fbf8e2cbf3ec64190a0270995340ece4047d525d239b8230759bf2f1f17912b6e357c06608c2414658d3cd03edb28c36b006e1
-
SSDEEP
6144:3SK1AqRHi/EXtw+apQ3an64DQFu/U3buRKlemZ9DnGAeOhYp+c:3osHiGWRpQb4DQFu/U3buRKlemZ9DnGn
Behavioral task
behavioral1
Sample
3145cd124db5c8c34e053aea87694baa_zeppelin_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
3145cd124db5c8c34e053aea87694baa_zeppelin_JC.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
C:\Program Files\Java\jdk1.7.0_80\!!! YOUR FILES HAVE BEEN ENCRYPTED !!!.TXT
https://tox.chat/download.html
Targets
-
-
Target
3145cd124db5c8c34e053aea87694baa_zeppelin_JC.exe
-
Size
225KB
-
MD5
3145cd124db5c8c34e053aea87694baa
-
SHA1
5645f85669b81b82936a821900425046a511dc8d
-
SHA256
52e8721e17365eb4281908df3ffbe6920ad0da496ec7b6288812e564002801b7
-
SHA512
a180166e2cc56ec429e7edfee7fbf8e2cbf3ec64190a0270995340ece4047d525d239b8230759bf2f1f17912b6e357c06608c2414658d3cd03edb28c36b006e1
-
SSDEEP
6144:3SK1AqRHi/EXtw+apQ3an64DQFu/U3buRKlemZ9DnGAeOhYp+c:3osHiGWRpQb4DQFu/U3buRKlemZ9DnGn
Score10/10-
Detects Zeppelin payload
-
Zeppelin Ransomware
Ransomware-as-a-service (RaaS) written in Delphi and first seen in 2019.
-
Renames multiple (6964) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (7459) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Stops running service(s)
-
Deletes itself
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-