General
-
Target
Zeppelinbggaehbcdj14_browsingExe.exe
-
Size
257KB
-
Sample
230802-wtl9vagf37
-
MD5
f66b738e1bfe1f8aab510abed850c424
-
SHA1
571f50fee0acad1da39fe06c75116461800cc719
-
SHA256
faa79c796c27b11c4f007023e50509662eac4bca99a71b26a9122c260abfb3c6
-
SHA512
dd8b63631b23a18f062e64c5e719ead52075964a2e465dfc2663425c97f0030ced80b6e48fdc84d54b2b8fb42513a9c9d0a60763eb2feca9f89c900b5bdcb97f
-
SSDEEP
6144:k957WWlJmcyfwAPWna4DQFu/U3buRKlemZ9DnGAevIGZi+YyJE1yR:O7WWKvhPWa4DQFu/U3buRKlemZ9DnGAy
Behavioral task
behavioral1
Sample
Zeppelinbggaehbcdj14_browsingExe.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Zeppelinbggaehbcdj14_browsingExe.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-3408354897-1169622894-3874090110-1000\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
http://vsociethok6sbprvevl4dlwbqrzyhxcxaqpvcqt5belwvsuxaxsutyad.onion
Targets
-
-
Target
Zeppelinbggaehbcdj14_browsingExe.exe
-
Size
257KB
-
MD5
f66b738e1bfe1f8aab510abed850c424
-
SHA1
571f50fee0acad1da39fe06c75116461800cc719
-
SHA256
faa79c796c27b11c4f007023e50509662eac4bca99a71b26a9122c260abfb3c6
-
SHA512
dd8b63631b23a18f062e64c5e719ead52075964a2e465dfc2663425c97f0030ced80b6e48fdc84d54b2b8fb42513a9c9d0a60763eb2feca9f89c900b5bdcb97f
-
SSDEEP
6144:k957WWlJmcyfwAPWna4DQFu/U3buRKlemZ9DnGAevIGZi+YyJE1yR:O7WWKvhPWa4DQFu/U3buRKlemZ9DnGAy
-
Detect Neshta payload
-
Detects Zeppelin payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Zeppelin Ransomware
Ransomware-as-a-service (RaaS) written in Delphi and first seen in 2019.
-
Renames multiple (358) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (370) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1