General
-
Target
Zeppelin-0b.zip
-
Size
114KB
-
Sample
250404-a7lpkszkw8
-
MD5
d78360ec2275957089ac107d901fa501
-
SHA1
f2930cd6a1e464204409aeb6b101148cbeae378c
-
SHA256
d0c022853ce5af49e193e9187be3710d0bc2380d6c93171d3ba6c483a3483205
-
SHA512
322454962d3535022c9bc99b8ffbc78fa83788b3d7ec11f9198b558afd2d8774ec150bf07e258d4c53dfeb8e843f4f89a2747d6e917c037ecb0bed1a559de3b5
-
SSDEEP
3072:AAoO/Uy6wnOMOaVDpiH6VfCLeyBYRUcRRuyaZAX:dD/UyrcaVNile1UcLuy+A
Behavioral task
behavioral1
Sample
Zeppelin.exe
Resource
win10v2004-20250313-en
Malware Config
Extracted
C:\Program Files\7-Zip\Lang\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Targets
-
-
Target
Zeppelin.exe
-
Size
211KB
-
MD5
f42abb7569dbc2ff5faa7e078cb71476
-
SHA1
04530a6165fc29ab536bab1be16f6b87c46288e6
-
SHA256
516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd
-
SHA512
3277534a02435538e144dea3476416e1d9117fcddef3dcb4379b82f33516c3e87767c3b0d2b880e61a3d803b583c96d772a0bdeecbfc109fe66444e9b29216af
-
SSDEEP
6144:zia1vcaEaA+HPsISAzG44DQFu/U3buRKlemZ9DnGAeWBES+:zHctWvVSAx4DQFu/U3buRKlemZ9DnGAn
-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Buran family
-
Detects Zeppelin payload
-
Zeppelin Ransomware
Ransomware-as-a-service (RaaS) written in Delphi and first seen in 2019.
-
Zeppelin family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (6079) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-