General

  • Target

    zimmerlock.exe

  • Size

    17.9MB

  • Sample

    241108-svjcsstngs

  • MD5

    3fce96a137b8af1a525db00d4d34abff

  • SHA1

    12fe937d6af286342b11a2a6fde7729246bc296a

  • SHA256

    7bf55b2f2a943c3be09e0f1683b9f64bca013c777a9fbfd236af23607f4b9f43

  • SHA512

    1a8ae30d9e22bdfd908a7ba67b506889218fcc8da698fd37ef4e0d13f8846dfc8e1edce76729c731f0c603394635bdfe2ab1a4a528aa18250f61c321380492ae

  • SSDEEP

    393216:ZqPnLFXlrzQMDOETgsvfGnhgh8XRvEqen7zRxNq:QPLFXNzQRE6K8W9zw

Malware Config

Targets

    • Target

      zimmerlock.exe

    • Size

      17.9MB

    • MD5

      3fce96a137b8af1a525db00d4d34abff

    • SHA1

      12fe937d6af286342b11a2a6fde7729246bc296a

    • SHA256

      7bf55b2f2a943c3be09e0f1683b9f64bca013c777a9fbfd236af23607f4b9f43

    • SHA512

      1a8ae30d9e22bdfd908a7ba67b506889218fcc8da698fd37ef4e0d13f8846dfc8e1edce76729c731f0c603394635bdfe2ab1a4a528aa18250f61c321380492ae

    • SSDEEP

      393216:ZqPnLFXlrzQMDOETgsvfGnhgh8XRvEqen7zRxNq:QPLFXNzQRE6K8W9zw

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks