General
-
Target
576b9b0e6da2715dc02068b053b4203b9bfda1eb0feca8bddcdfc0827c5db7d1
-
Size
214KB
-
Sample
220305-yqxbraaggk
-
MD5
e609a4e0e0a91ebc8771fcc3f25c0990
-
SHA1
c552fbec8d6679017b5e9dedd4f03e29cb4c8718
-
SHA256
576b9b0e6da2715dc02068b053b4203b9bfda1eb0feca8bddcdfc0827c5db7d1
-
SHA512
0fab0c68eec67ce7e54b28651b0c85f6fd0401888e83e7b2346acc95a802d283185a77790cdb98f3850350a190cfe30b7e9d757fcfb95a8012adc34393eeffda
Static task
static1
Behavioral task
behavioral1
Sample
576b9b0e6da2715dc02068b053b4203b9bfda1eb0feca8bddcdfc0827c5db7d1.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
576b9b0e6da2715dc02068b053b4203b9bfda1eb0feca8bddcdfc0827c5db7d1.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
C:\!!! HOW TO BACK YOUR FILES !!!.TXT
buran
Targets
-
-
Target
576b9b0e6da2715dc02068b053b4203b9bfda1eb0feca8bddcdfc0827c5db7d1
-
Size
214KB
-
MD5
e609a4e0e0a91ebc8771fcc3f25c0990
-
SHA1
c552fbec8d6679017b5e9dedd4f03e29cb4c8718
-
SHA256
576b9b0e6da2715dc02068b053b4203b9bfda1eb0feca8bddcdfc0827c5db7d1
-
SHA512
0fab0c68eec67ce7e54b28651b0c85f6fd0401888e83e7b2346acc95a802d283185a77790cdb98f3850350a190cfe30b7e9d757fcfb95a8012adc34393eeffda
Score10/10-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-