General
-
Target
60e2ff67f5e92eebcdca4b22343d4cd663e9c63e6259d9f4563e68da38b330e1
-
Size
214KB
-
Sample
220306-fn9j7abgcr
-
MD5
7f5669e4d89b5a1636f05b52b7c0f9b7
-
SHA1
12d7b1fb828cea1b1abb568bcc9d0e29e78ecdb6
-
SHA256
60e2ff67f5e92eebcdca4b22343d4cd663e9c63e6259d9f4563e68da38b330e1
-
SHA512
2010a75f1c8634480a42a2c995874459f4ab983fa90ae7fe7d12f0a6d53a34eb68622241f2a43c9218cb8290edb9ca6484991a7811d7e54ead7da5cb8ee3d220
Static task
static1
Behavioral task
behavioral1
Sample
60e2ff67f5e92eebcdca4b22343d4cd663e9c63e6259d9f4563e68da38b330e1.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
60e2ff67f5e92eebcdca4b22343d4cd663e9c63e6259d9f4563e68da38b330e1.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Targets
-
-
Target
60e2ff67f5e92eebcdca4b22343d4cd663e9c63e6259d9f4563e68da38b330e1
-
Size
214KB
-
MD5
7f5669e4d89b5a1636f05b52b7c0f9b7
-
SHA1
12d7b1fb828cea1b1abb568bcc9d0e29e78ecdb6
-
SHA256
60e2ff67f5e92eebcdca4b22343d4cd663e9c63e6259d9f4563e68da38b330e1
-
SHA512
2010a75f1c8634480a42a2c995874459f4ab983fa90ae7fe7d12f0a6d53a34eb68622241f2a43c9218cb8290edb9ca6484991a7811d7e54ead7da5cb8ee3d220
Score10/10-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-