General
-
Target
5613.js
-
Size
137KB
-
Sample
210831-ten5p7srbs
-
MD5
220af76150e7b8e51b12c322002d36db
-
SHA1
b5befee69c32ecaa162808192f3c0f42cde731cd
-
SHA256
924b39a646b7ba75fff348033897597b52f1a81af1830beeb279dca1556bd39b
-
SHA512
d540686c0415d11be1bd65e1f55313ee0e0a7bd543eda231188daee9a39aa5c2471b19e730b74a397d5d5826e7c9ee21e86f2168b696c7ff8e5a8b7a261b2328
Static task
static1
Behavioral task
behavioral1
Sample
5613.js
Resource
win7v20210408
Behavioral task
behavioral2
Sample
5613.js
Resource
win10v20210408
Malware Config
Extracted
https://jolantagraban.pl/log/57843441668980/dll/assistant.php
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Targets
-
-
Target
5613.js
-
Size
137KB
-
MD5
220af76150e7b8e51b12c322002d36db
-
SHA1
b5befee69c32ecaa162808192f3c0f42cde731cd
-
SHA256
924b39a646b7ba75fff348033897597b52f1a81af1830beeb279dca1556bd39b
-
SHA512
d540686c0415d11be1bd65e1f55313ee0e0a7bd543eda231188daee9a39aa5c2471b19e730b74a397d5d5826e7c9ee21e86f2168b696c7ff8e5a8b7a261b2328
Score10/10-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-