General
-
Target
9403.js
-
Size
345KB
-
Sample
210831-ayvc4rd3e6
-
MD5
eea189749c6dcf6c8c04205ab60bb53c
-
SHA1
62ddf57299772f737a0ed6b5cc128e6357eea2c8
-
SHA256
70ec3d6d6a6978bd21bd40b4e3e3a569d48b05fac0a7a8765753704d4197bfa2
-
SHA512
f0c4f1e2ab43eb984f84abcf36075976f2f2be8e4e87f24c821ddfa076638a7271bb6278f8857bb18113034a6bb89fcf2a2a1c3e3b6b6a39b9536facee985d4e
Static task
static1
Behavioral task
behavioral1
Sample
9403.js
Resource
win7v20210410
Behavioral task
behavioral2
Sample
9403.js
Resource
win10v20210408
Malware Config
Extracted
https://jolantagraban.pl/log/57843441668980/dll/assistant.php
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Targets
-
-
Target
9403.js
-
Size
345KB
-
MD5
eea189749c6dcf6c8c04205ab60bb53c
-
SHA1
62ddf57299772f737a0ed6b5cc128e6357eea2c8
-
SHA256
70ec3d6d6a6978bd21bd40b4e3e3a569d48b05fac0a7a8765753704d4197bfa2
-
SHA512
f0c4f1e2ab43eb984f84abcf36075976f2f2be8e4e87f24c821ddfa076638a7271bb6278f8857bb18113034a6bb89fcf2a2a1c3e3b6b6a39b9536facee985d4e
Score10/10-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-