General
-
Target
6772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9
-
Size
2.6MB
-
Sample
220306-aptbpsbdbp
-
MD5
811527176b1b2357e96f357e141c7f29
-
SHA1
8d00d383b6c4825edcf46a620d7b7a3e5f53e09d
-
SHA256
6772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9
-
SHA512
597aaab2e64ad2917aa308d8c65811024de20eee1c3c19f624c77a62174d08fd26daf95c6e50b3e74c338fecceab466b2d84517b759f2f24cd26e4d3331bea92
Static task
static1
Behavioral task
behavioral1
Sample
6772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
6772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Targets
-
-
Target
6772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9
-
Size
2.6MB
-
MD5
811527176b1b2357e96f357e141c7f29
-
SHA1
8d00d383b6c4825edcf46a620d7b7a3e5f53e09d
-
SHA256
6772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9
-
SHA512
597aaab2e64ad2917aa308d8c65811024de20eee1c3c19f624c77a62174d08fd26daf95c6e50b3e74c338fecceab466b2d84517b759f2f24cd26e4d3331bea92
Score10/10-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-