General
-
Target
a73f8ece11668d7486e0823716550dcea7fce73fd3084303a359f2f182c8cacf
-
Size
211KB
-
Sample
211022-1rx1sacbc3
-
MD5
d4e8fe23840956af5509d7f0ed048a0e
-
SHA1
d7f01f6b45f4fbe64d1a58559bda909cba430277
-
SHA256
a73f8ece11668d7486e0823716550dcea7fce73fd3084303a359f2f182c8cacf
-
SHA512
efc26c1db244476c196cddaa4e5bf502dcaec87a8f39e24891e42bf418d039b728087517a27a85d9db875da77dc04e3bce9fd7bf6fe1fb62127e69da5cb45d6b
Static task
static1
Behavioral task
behavioral1
Sample
a73f8ece11668d7486e0823716550dcea7fce73fd3084303a359f2f182c8cacf.exe
Resource
win10-en-20210920
Malware Config
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Targets
-
-
Target
a73f8ece11668d7486e0823716550dcea7fce73fd3084303a359f2f182c8cacf
-
Size
211KB
-
MD5
d4e8fe23840956af5509d7f0ed048a0e
-
SHA1
d7f01f6b45f4fbe64d1a58559bda909cba430277
-
SHA256
a73f8ece11668d7486e0823716550dcea7fce73fd3084303a359f2f182c8cacf
-
SHA512
efc26c1db244476c196cddaa4e5bf502dcaec87a8f39e24891e42bf418d039b728087517a27a85d9db875da77dc04e3bce9fd7bf6fe1fb62127e69da5cb45d6b
Score10/10-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Deletes itself
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-