109. Another AV/EDR Killer in a Ransomware Gang's Toolkit: ZammOcide

Hello everyone! Let's look at another tool used by ransomware gangs to disable AV/EDR solutions. I'm talking about ZammOcide.

So, it's another example of abusing a vulnerable driver, this time Zemana Anti-Malware driver (zam64.sys). Of course, we can hunt for related events:

event_type: "driverloadwin" 

AND

file_name: "zam64.sys"

It also creates a service named "ZammOcide". We can use it for detection as well:

event_type: "serviceinstallwin"

AND

service_name: "ZammOcide"

Of course, the tool is used ITW! For example, by CrazyHunter ransomware group.

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge