General
-
Target
8441952734.zip
-
Size
99KB
-
Sample
221121-gg15xahh8t
-
MD5
3ea0ab42bcab5745ba3631f01c4d4cd3
-
SHA1
9eb457ce8568fa4a4375cdebbf3b181976a99718
-
SHA256
41d6fb7f590167acde5cb8d7f3c38fcdc0bcc4c33027b594003967b18e761101
-
SHA512
62a629f3d4b7eb13b93daa34e16f46d480516a8868d4e812981ff8847e024b959b526df94d569fd9bac2e3f934819cc917a936e31c3710a8eb1e63ec0976475d
-
SSDEEP
1536:M+Ovx10yq8KousTaexxb/nREiXKFBjmSN5bI74xB7iXybvDJujQeoeaP:DOLbKouTkREiXKFBSSN58U8uDJ4/Ny
Static task
static1
Behavioral task
behavioral1
Sample
bc67b94181dd4d613f3648c25c584aad5226cc1ec1999bd03d550c7f242eb7cb.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bc67b94181dd4d613f3648c25c584aad5226cc1ec1999bd03d550c7f242eb7cb.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
\??\Z:\WE CAN RECOVER YOUR DATA.txt
buran
Extracted
C:\WE CAN RECOVER YOUR DATA.txt
buran
Targets
-
-
Target
bc67b94181dd4d613f3648c25c584aad5226cc1ec1999bd03d550c7f242eb7cb
-
Size
189KB
-
MD5
f1ebb4dbdfc6ec7a53bcefabdc7fb6de
-
SHA1
b76bc50249e7420ac0f4f64e83d1a58da2068eaa
-
SHA256
bc67b94181dd4d613f3648c25c584aad5226cc1ec1999bd03d550c7f242eb7cb
-
SHA512
8608689d716fe8ed44348b4382cf4aed67de6dd4a9da2d92a8fcbd731ccf1a7f42e60ce35376ccef81b67414f2f8ea8bbcd3b2054d78f344ad92d1f4f29ca788
-
SSDEEP
3072:t3blGV9hulKmhbfvjv69vF6nHynNPFW7Lifa81Hh7Gl8emNiq8q/f+2L:t3bq9UlKgPuEyNFWSb1Hg6l8q/ffL
Score10/10-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-