Rewterz Threat Alert – Chaos Ransomware – Active IOCs
October 4, 2022Rewterz Threat Alert – PatchWork APT Group Targeting Pakistan – Active IOCs
October 4, 2022Rewterz Threat Alert – Chaos Ransomware – Active IOCs
October 4, 2022Rewterz Threat Alert – PatchWork APT Group Targeting Pakistan – Active IOCs
October 4, 2022Severity
High
Analysis Summary
Zeppelin most commonly is distributed through phishing emails with macro-enabled documents attached, although it has also been known to spread via malvertising and RDP. Once on the system, Zeppelin leverages the same memory allocation techniques to run its payload in memory. In terms of the decryption routine, Zeppelin has evolved to load APIs onto the stack and implements additional obfuscation techniques. Both Buran and Zeppelin perform geolocation checks prior to proceeding with encryption, avoiding encrypting hosts located in Ukraine, Belarus, Kazakhstan, or Russia. For storing configuration data, a Registry key is created. The earliest versions of Zeppelin included the “Buran” keyword in the Registry key name, but have since switched to using “Zeppelin.” Zeppelin is also capable of creating persistence via a Registry Run key. Multiple instances of the executable are run, each with a different purpose. For example, one terminates processes associated with important files while also running Clipbanker to monitor the clipboard, while another is responsible for encryption of files. During encryption, both Buran and Zeppelin use add an infection marker to encrypted files. Finally, both drop a ransom note and open it using notepad.exe.
Impact
- Files Encryption
Indicators of Compromise
MD5
- 511e849a593b7787b1387b56f12d8c05
SHA-256
- 7757c11c449860e2dd54ae97e05835fb39f89a9c93f32dfc23b258ad49c3622e
SHA-1
- 6c830eed04570ba8f8873cba3f61ca568f7b9535
Remediation
- Block all threat indicators at your respective controls.
- Search for IOCs in your environment.
- Do not download email attachments coming from untrusted sources.