MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 54f6ec27eb7526c439d33e7592e4864842fccf950d828fe14ef7c8eb080ee371. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Zeppelin


Vendor detections: 12


Intelligence 12 IOCs YARA 3 File information Comments

SHA256 hash: 54f6ec27eb7526c439d33e7592e4864842fccf950d828fe14ef7c8eb080ee371
SHA3-384 hash: 347f2144e2267eb8dafc79631061d2912424f2c32ec57c5103647b234d77a5a1734511f488bcfc0442771e563f4ccae2
SHA1 hash: cc7eca3c24883a3b563288c08cfab7cc248a0315
MD5 hash: 567204cbb8d1c5908a5316f9dfdcb353
humanhash: beryllium-bluebird-angel-autumn
File name:imposter11.exe
Download: download sample
Signature Zeppelin
File size:456'704 bytes
First seen:2020-12-18 13:48:48 UTC
Last seen:2020-12-18 15:34:54 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash e418f14f8bca5924e21b485b7c6269a1 (1 x Zeppelin)
ssdeep 6144:NICjjI4WHB/8cQoASA0AVjq6g0uhq+r0+K248Bb+MNa:ai6hEcQoA50sbuPq24EbJ
Threatray 34 similar samples on MalwareBazaar
TLSH 82A459396212D342E1AC1A7162C73B740B775DAB71E1347F89F07B1919BB7C8389B6A0
Reporter JAMESWT_WT
Tags:Zeppelin

Intelligence


File Origin
# of uploads :
2
# of downloads :
248
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
imposter11.exe
Verdict:
Malicious activity
Analysis date:
2020-12-18 13:49:00 UTC
Tags:
ransomware

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Deleting a recently created file
Creating a file in the %AppData% subdirectories
Creating a process from a recently created file
Sending a UDP request
Running batch commands
Creating a process with a hidden window
Changing a file
Creating a file
Creating a file in the Program Files directory
Creating a file in the Program Files subdirectories
Moving a file to the Program Files subdirectory
Modifying an executable file
Launching a service
Launching a process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Creating a file in the mass storage device
Deleting volume shadow copies
Encrypting user's files
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
4444_Ransomware
Detection:
malicious
Classification:
rans.evad
Score:
100 / 100
Signature
Contains functionality to inject threads in other processes
Creates a thread in another existing process (thread injection)
Creates executable files without a name
Creates files in the recycle bin to hide itself
Deletes shadow drive data (may be related to ransomware)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Drops PE files with benign system names
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies existing user documents (likely ransomware behavior)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sample is not signed and drops a device driver
Sigma detected: Delete shadow copy via WMIC
Sigma detected: System File Execution Location Anomaly
Sigma detected: WannaCry Ransomware
Uses bcdedit to modify the Windows boot settings
Writes many files with high entropy
Yara detected 4444_Ransomware
Yara detected Ransomware_Generic
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 332243 Sample: imposter11.exe Startdate: 18/12/2020 Architecture: WINDOWS Score: 100 61 Sigma detected: WannaCry Ransomware 2->61 63 Malicious sample detected (through community Yara rule) 2->63 65 Multi AV Scanner detection for submitted file 2->65 67 7 other signatures 2->67 8 imposter11.exe 2 4 2->8         started        12 services.exe 1 2->12         started        14 services.exe 2->14         started        16 notepad.exe 2->16         started        process3 file4 57 C:\Users\user\AppData\...\services.exe, PE32 8->57 dropped 59 C:\Users\...\services.exe:Zone.Identifier, ASCII 8->59 dropped 87 Detected unpacking (changes PE section rights) 8->87 89 Detected unpacking (overwrites its own PE header) 8->89 91 Contains functionality to inject threads in other processes 8->91 93 Drops PE files with benign system names 8->93 18 services.exe 4 2 8->18         started        signatures5 process6 signatures7 69 Multi AV Scanner detection for dropped file 18->69 71 Detected unpacking (changes PE section rights) 18->71 73 Detected unpacking (overwrites its own PE header) 18->73 75 6 other signatures 18->75 21 services.exe 1 501 18->21         started        25 cmd.exe 1 18->25         started        27 cmd.exe 1 18->27         started        29 4 other processes 18->29 process8 file9 49 C:\Users\user\Desktop\imposter11.exe, Unknown 21->49 dropped 51 C:\Users\user\Desktop\ZQIXMVQGAH.xlsx, Unknown 21->51 dropped 53 C:\Users\user\Desktop\QCFWYSKMHA.png, Unknown 21->53 dropped 55 60 other malicious files 21->55 dropped 77 Creates files in the recycle bin to hide itself 21->77 79 Creates executable files without a name 21->79 81 Sample is not signed and drops a device driver 21->81 83 Modifies existing user documents (likely ransomware behavior) 21->83 85 Deletes shadow drive data (may be related to ransomware) 25->85 31 WMIC.exe 1 25->31         started        33 conhost.exe 25->33         started        35 vssadmin.exe 25->35         started        37 WMIC.exe 1 27->37         started        39 conhost.exe 27->39         started        41 conhost.exe 29->41         started        43 conhost.exe 29->43         started        45 conhost.exe 29->45         started        47 2 other processes 29->47 signatures10 process11
Threat name:
Win32.Ransomware.FileCoder
Status:
Malicious
First seen:
2020-12-14 11:27:07 UTC
File Type:
PE (Exe)
Extracted files:
3
AV detection:
25 of 29 (86.21%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:buran persistence ransomware
Behaviour
Interacts with shadow copies
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Drops file in Program Files directory
Drops file in Windows directory
Adds Run key to start application
Enumerates connected drives
Loads dropped DLL
Executes dropped EXE
Modifies extensions of user files
Deletes shadow copies
Buran
Unpacked files
SH256 hash:
576b9b0e6da2715dc02068b053b4203b9bfda1eb0feca8bddcdfc0827c5db7d1
MD5 hash:
e609a4e0e0a91ebc8771fcc3f25c0990
SHA1 hash:
c552fbec8d6679017b5e9dedd4f03e29cb4c8718
Detections:
win_zeppelin_ransomware_auto
SH256 hash:
54f6ec27eb7526c439d33e7592e4864842fccf950d828fe14ef7c8eb080ee371
MD5 hash:
567204cbb8d1c5908a5316f9dfdcb353
SHA1 hash:
cc7eca3c24883a3b563288c08cfab7cc248a0315
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Win32_Ransomware_Zeppelin
Author:ReversingLabs
Description:Yara rule that detects Zeppelin ransomware.
Rule name:win_zeppelin_ransomware_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:Zeppelin
Author:@bartblaze
Description:Identifies Zeppelin ransomware and variants (Buran, Vega etc.)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Zeppelin

Executable exe 54f6ec27eb7526c439d33e7592e4864842fccf950d828fe14ef7c8eb080ee371

(this sample)

  
Delivery method
Distributed via web download

Comments