General
-
Target
pattern.7z
-
Size
147KB
-
Sample
210831-3l4tzdbalx
-
MD5
23bb381a8822adc907509da8821c5847
-
SHA1
00fc096e69767c4afa1bc83ec0cc73630a184f37
-
SHA256
6d27b9968c95e5bfa75e7b4232fac3d7dc0f118c3ee7e8be5397111128b9fa68
-
SHA512
aac39ded08a9544cef0b220830ad9cbf71865090353a09986232d9dd25b2e13db3eaa60cbdfe3e0263b040dbbfde1542e36e2b3f306fe642d1a88a81a8de27f7
Static task
static1
Behavioral task
behavioral1
Sample
pattern.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
pattern.exe
Resource
win10v20210408
Malware Config
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Targets
-
-
Target
pattern.exe
-
Size
416KB
-
MD5
dcef208fcdac3345c6899a478d16980f
-
SHA1
fd127c6ecaee57972b7acc3b8e4a2d3b25f928e0
-
SHA256
824a76c39895bc3ad4f5dfc27fc3ac80d26514118c4669505a1f0cfdc8fdbcdc
-
SHA512
28e403a6d66895a2461828f49acb2862602e6be94405657bee0aec5d35d86dd83713c4cd1f33d28b94fed6546633683f9ffa693d37dc94bc862f6584833f9fba
Score10/10-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Deletes itself
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-