General
-
Target
6440.js
-
Size
541KB
-
Sample
210831-hdfz8htfb6
-
MD5
268848cb4ff95f5b95a8c619b626eb1e
-
SHA1
1ba3890f085853d01475ddf9fa3d991dee706be6
-
SHA256
f827fc739c432960cabffffa30111ac512e019928c22ce6f55efca587bdb75bf
-
SHA512
07cfd18fa8ec70db0a1c0f061ee5c6951979bada17777dd30cc473ee0cb161882109920a8d46ca961d4626231d94b4bac85a52180c34ae90442d16d70192781c
Static task
static1
Behavioral task
behavioral1
Sample
6440.js
Resource
win7v20210410
Behavioral task
behavioral2
Sample
6440.js
Resource
win10v20210408
Malware Config
Extracted
https://jolantagraban.pl/log/57843441668980/dll/assistant.php
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Targets
-
-
Target
6440.js
-
Size
541KB
-
MD5
268848cb4ff95f5b95a8c619b626eb1e
-
SHA1
1ba3890f085853d01475ddf9fa3d991dee706be6
-
SHA256
f827fc739c432960cabffffa30111ac512e019928c22ce6f55efca587bdb75bf
-
SHA512
07cfd18fa8ec70db0a1c0f061ee5c6951979bada17777dd30cc473ee0cb161882109920a8d46ca961d4626231d94b4bac85a52180c34ae90442d16d70192781c
Score10/10-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-