General

  • Target

    from_scr.zip

  • Size

    220KB

  • Sample

    211112-rr57qadfb7

  • MD5

    6ac98e6f4ca6c1aef03d1762fac9e509

  • SHA1

    35335a2a26630610c38df57cd9268a739e926d13

  • SHA256

    821f00a583cec7f3fd2f3eeaab595e6293cc7dc94cf4954c6e05ac5caec55864

  • SHA512

    dd45cc2ced3e5e537dfacc1814158e97d7d4396065582be7e7d4e4c7f7d912c75dad55e2fa3a52ab4922d76593ef71f99bafceb33230336e7042fd7cf6a46ffb

Malware Config

Extracted

Path

C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT

Family

buran

Ransom Note
!!! ALL YOUR FILES ARE ENCRYPTED !!! All your files, documents, photos, databases and other important files are encrypted. You are not able to decrypt it by yourself! The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files. To be sure we have the decryptor and it works you can send an email: [email protected] and decrypt one file for free. But this file should be of not valuable! Do you really want to restore your files? Write to email: [email protected] Reserved email: [email protected] Reserved email: [email protected] Your personal ID: 51D-13D-DB0 Attention! * Do not rename encrypted files. * Do not try to decrypt your data using third party software, it may cause permanent data loss. * Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.

Targets

    • Target

      123.exe

    • Size

      214KB

    • MD5

      c14d403c9e9d6b6054e09ceee047fbf1

    • SHA1

      2155b8d3b977f32641314207bb24126741b71d13

    • SHA256

      005b00d41740f7b0327d4d5fe0402dcfc84ae0df44a2231a89a59909eeb30b23

    • SHA512

      f5a0380cf6c7f3c14bd0efefeec1be88d0d92257ace44a97360e17c88e27c59cb424cd7283e2085431ba95d62eac30d017e3f41d7c1ccb4468a0bcaa3984d6d3

    Score
    1/10
    • Target

      Telegram.dll

    • Size

      201KB

    • MD5

      c0b2a28fff2c9967f7ac76e6618e9d96

    • SHA1

      92ead3813bf07fcc3b897f358b71d40a4c4d24d6

    • SHA256

      532cedf1c9c50a145f7d4192ef79b5054e65ab3667cc0cef371f644eb68b8681

    • SHA512

      265840b977c7eb614b7afd431e0afde5622c8673ae3480c14ae3611707787fb71d57cb71850f8d3d3629adc987a23820b019ab18bd8982cbecb922d4fe8623e2

    • Buran

      Ransomware-as-a-service based on the VegaLocker family first identified in 2019.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks