General
-
Target
2024-04-12_eebfab07abcb75f2aa1821a4efcf7cfd_zeppelin
-
Size
210KB
-
Sample
240413-amf9csbf3x
-
MD5
eebfab07abcb75f2aa1821a4efcf7cfd
-
SHA1
2e2c0667215777d5a0f5e0972af6cf5418febeb1
-
SHA256
83739dc8c9f8430b1a8ade85e926bf8084942759cd1d4e502c1960ce02e93d5b
-
SHA512
ac22326f0c365b14b16e3c942a2424d60cb7b1431ece875a3247b0771da3bdb2e7b86bf1ae2bbb3506dfb82f687f1c4d8f51bc0b788f7e919f802c496eef454a
-
SSDEEP
6144:Ria1vcaEre+HPsKSAzG44DQFu/U3buRKlemZ9DnGAeWBJR1+W:RHcthvzSAx4DQFu/U3buRKlemZ9DnGAL
Behavioral task
behavioral1
Sample
2024-04-12_eebfab07abcb75f2aa1821a4efcf7cfd_zeppelin.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-12_eebfab07abcb75f2aa1821a4efcf7cfd_zeppelin.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\Program Files\Java\jdk1.7.0_80\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Targets
-
-
Target
2024-04-12_eebfab07abcb75f2aa1821a4efcf7cfd_zeppelin
-
Size
210KB
-
MD5
eebfab07abcb75f2aa1821a4efcf7cfd
-
SHA1
2e2c0667215777d5a0f5e0972af6cf5418febeb1
-
SHA256
83739dc8c9f8430b1a8ade85e926bf8084942759cd1d4e502c1960ce02e93d5b
-
SHA512
ac22326f0c365b14b16e3c942a2424d60cb7b1431ece875a3247b0771da3bdb2e7b86bf1ae2bbb3506dfb82f687f1c4d8f51bc0b788f7e919f802c496eef454a
-
SSDEEP
6144:Ria1vcaEre+HPsKSAzG44DQFu/U3buRKlemZ9DnGAeWBJR1+W:RHcthvzSAx4DQFu/U3buRKlemZ9DnGAL
Score10/10-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Detects Zeppelin payload
-
Zeppelin Ransomware
Ransomware-as-a-service (RaaS) written in Delphi and first seen in 2019.
-
Renames multiple (7380) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-