109. Another AV/EDR Killer in a Ransomware Gang's Toolkit: ZammOcide
Hello everyone! Let's look at another tool used by ransomware gangs to disable AV/EDR solutions. I'm talking about ZammOcide.
So, it's another example of abusing a vulnerable driver, this time Zemana Anti-Malware driver (zam64.sys). Of course, we can hunt for related events:
event_type: "driverloadwin"
AND
file_name: "zam64.sys"
It also creates a service named "ZammOcide". We can use it for detection as well:
event_type: "serviceinstallwin"
AND
service_name: "ZammOcide"
Of course, the tool is used ITW! For example, by CrazyHunter ransomware group.
See you tomorrow!
Comments
Post a Comment