General
-
Target
2024-02-26_b2a478d698a2789ce04d8d54158a7d64_zeppelin
-
Size
227KB
-
Sample
240226-wbglmscf6s
-
MD5
b2a478d698a2789ce04d8d54158a7d64
-
SHA1
49cf775b235dd75dde60a70af385fff93a665e9c
-
SHA256
a2ef8ef7be1ef11158f7d406e96c240178068b9692ec5e5ce19f9239345ee825
-
SHA512
6b9b62d1f0610fff7cd79fb10e44a50739405043d168ca240a7bde22eea231ed74f20d77a99b2fe1d65f14581463d0fc0ca61e9fc54ca9e9c6b8ab23d7c746eb
-
SSDEEP
6144:eia1C9bP2XUJmcCvyr/2H64DQFu/U3buRKlemZ9DnGAefIC8+:eq9bP2Rfo/2a4DQFu/U3buRKlemZ9DnY
Behavioral task
behavioral1
Sample
2024-02-26_b2a478d698a2789ce04d8d54158a7d64_zeppelin.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-02-26_b2a478d698a2789ce04d8d54158a7d64_zeppelin.exe
Resource
win10v2004-20240221-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2248906074-2862704502-246302768-1000\!!! YOUR FILES HAVE BEEN ENCRYPTED !!!.TXT
https://tox.chat/download.html
Targets
-
-
Target
2024-02-26_b2a478d698a2789ce04d8d54158a7d64_zeppelin
-
Size
227KB
-
MD5
b2a478d698a2789ce04d8d54158a7d64
-
SHA1
49cf775b235dd75dde60a70af385fff93a665e9c
-
SHA256
a2ef8ef7be1ef11158f7d406e96c240178068b9692ec5e5ce19f9239345ee825
-
SHA512
6b9b62d1f0610fff7cd79fb10e44a50739405043d168ca240a7bde22eea231ed74f20d77a99b2fe1d65f14581463d0fc0ca61e9fc54ca9e9c6b8ab23d7c746eb
-
SSDEEP
6144:eia1C9bP2XUJmcCvyr/2H64DQFu/U3buRKlemZ9DnGAefIC8+:eq9bP2Rfo/2a4DQFu/U3buRKlemZ9DnY
Score10/10-
Detects Zeppelin payload
-
Zeppelin Ransomware
Ransomware-as-a-service (RaaS) written in Delphi and first seen in 2019.
-
Detects command variations typically used by ransomware
-
Renames multiple (7439) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Stops running service(s)
-
Deletes itself
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-