General
-
Target
3346.zip
-
Size
319KB
-
Sample
210811-al1kb163g2
-
MD5
6744b64d318cfeea92c755301cb93a95
-
SHA1
dc8acdc92897111d6322b1eb016793f944ebcc39
-
SHA256
84825c5810241c7a092119d19b92165b11774135d9557d7c54212bd6ccaa5a24
-
SHA512
893b8b1026ccd8f0e4b3497b78b7577322f57ddb77cdfa3431b2b7f7523940a39b9d0d772eebf4a1684f2159f5b44b704c4f6b2a1d8a0f4da8caa4afa8050e86
Static task
static1
Behavioral task
behavioral1
Sample
3346.js
Resource
win7v20210410
Behavioral task
behavioral2
Sample
3346.js
Resource
win10v20210408
Malware Config
Extracted
https://erzurum.us/65376345273497600381/tjTyjrjywrdmJoaaenvF/dll/assistant.php
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Targets
-
-
Target
3346.js
-
Size
530KB
-
MD5
7e23a9a840725f3431ef5825c6ab6839
-
SHA1
b9f307ac96ded5c42d931f7c4355756164ca0123
-
SHA256
09eeec589e425f4da6dc1587e49f7f32c17f4c9e026b10c2360e5b3f72699ca7
-
SHA512
51f027140d19f3b493d91a664d4c8bf2514b38c210f28178948a21d56fcde0ed99a068d7c0d04b9b3012ad03fc5be6e88d8e0f78aeb55bb919a2170a7e47da92
Score10/10-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-