General
-
Target
4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144
-
Size
217KB
-
Sample
220305-tt2nesachj
-
MD5
cffe48eed73a2006503d1094dd7e07bf
-
SHA1
2484ea7e8661d7f21aadb7fb4d79748bc7baae73
-
SHA256
4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144
-
SHA512
959cd0e7ad00e019301747b0eb4f080f1e2227d360f01f6095c7fc2a8876158b1fbe644f9fc5156c290bbf756a62df26244cc3a94f811cdd9f6ef67c422af5eb
Static task
static1
Behavioral task
behavioral1
Sample
4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
_______________
_______________
Targets
-
-
Target
4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144
-
Size
217KB
-
MD5
cffe48eed73a2006503d1094dd7e07bf
-
SHA1
2484ea7e8661d7f21aadb7fb4d79748bc7baae73
-
SHA256
4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144
-
SHA512
959cd0e7ad00e019301747b0eb4f080f1e2227d360f01f6095c7fc2a8876158b1fbe644f9fc5156c290bbf756a62df26244cc3a94f811cdd9f6ef67c422af5eb
Score10/10-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-