MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 eb920e0fc0c360abb901e04dce172459b63bbda3ab8152350885db4b44d63ce5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Zeppelin


Vendor detections: 8


Intelligence 8 IOCs YARA 3 File information Comments

SHA256 hash: eb920e0fc0c360abb901e04dce172459b63bbda3ab8152350885db4b44d63ce5
SHA3-384 hash: 72c5f672834c2deebe42f889b0d5081e3202280b74640c7a198b10f212f48d12918d8c8cfa0410ec875e724fc0833267
SHA1 hash: b5e04a9003c57598ed64afa4fef7ac16c09a43a4
MD5 hash: da997e4d9f1fa7f863aabc3f0dc32216
humanhash: pizza-pluto-thirteen-green
File name:eb920e0fc0c360abb901e04dce172459b63bbda3ab8152350885db4b44d63ce5.bin
Download: download sample
Signature Zeppelin
File size:217'088 bytes
First seen:2020-11-06 15:31:30 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 8acb34bed3caa60cae3f08f75d53f727 (15 x Zeppelin)
ssdeep 6144:Lia1gMHvEXtAuL5Qnqn64DQFu/U3buRKlemZ9DnGAe+hu+8:LIMH2Gw5Qb4DQFu/U3buRKlemZ9DnGAy
Threatray 13 similar samples on MalwareBazaar
TLSH E8248E36EAC08936D1321E3CDE4E52AE516FBA301E18585779E81F8D9F7D3A2652C1C3
Reporter Arkbird_SOLG
Tags:buran Ransomware retrohunt Zeppelin

Intelligence


File Origin
# of uploads :
1
# of downloads :
1'997
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
DNS request
Sending an HTTP GET request
Sending a custom TCP request
Creating a file in the %temp% directory
Deleting a recently created file
Creating a file in the %AppData% subdirectories
Creating a process from a recently created file
Launching a process
Launching the default Windows debugger (dwwin.exe)
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Deleting of the original file
Unauthorized injection to a system process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Ransomware.Zeppelin
Status:
Malicious
First seen:
2020-10-23 17:59:00 UTC
AV detection:
27 of 29 (93.10%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:buran persistence ransomware
Behaviour
Interacts with shadow copies
Modifies system certificate store
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Drops file in Program Files directory
Modifies service
Adds Run key to start application
Enumerates connected drives
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Deletes itself
Loads dropped DLL
Executes dropped EXE
Modifies extensions of user files
Deletes shadow copies
Buran
Unpacked files
SH256 hash:
eb920e0fc0c360abb901e04dce172459b63bbda3ab8152350885db4b44d63ce5
MD5 hash:
da997e4d9f1fa7f863aabc3f0dc32216
SHA1 hash:
b5e04a9003c57598ed64afa4fef7ac16c09a43a4
Detections:
win_zeppelin_ransomware_auto
SH256 hash:
fd6890c66005ba25e06d221deac60e6d3535938f5aab5782f08392c7863dc764
MD5 hash:
efba68752908c6ef7ab0c3d89a2587ba
SHA1 hash:
43cf3b28e75238821d1daefa92e49f3a60e76bec
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Win32_Ransomware_Zeppelin
Author:ReversingLabs
Description:Yara rule that detects Zeppelin ransomware.
Rule name:win_zeppelin_ransomware_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:Zeppelin
Author:@bartblaze
Description:Identifies Zeppelin ransomware and variants (Buran, Vega etc.)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments