General
-
Target
6a4c8a0b7622b3621900bf47acb16725c4a8dafde394f2bf2bf7112bd90a3408.exe
-
Size
215KB
-
Sample
221202-py4w5acg9z
-
MD5
e71825acc5c0dbf948ec73b12c397a23
-
SHA1
efe7521f2f6f06840418ca99b57989ec7dd797c5
-
SHA256
6a4c8a0b7622b3621900bf47acb16725c4a8dafde394f2bf2bf7112bd90a3408
-
SHA512
c9369d2a89f54250149b3a92d1d12b2f1a38fcf76e961d08f5ea4c3aec29bc338d8d5113df0bdd35aed5ff2d4c2d71ac3195e27d72489d9275553833314d7fe5
-
SSDEEP
6144:cyJE1yd7WEJmcyf70PWna4DQFu/U3buRKlemZ9DnGAevIGn+:cU/d7WRvIPWa4DQFu/U3buRKlemZ9DnG
Behavioral task
behavioral1
Sample
6a4c8a0b7622b3621900bf47acb16725c4a8dafde394f2bf2bf7112bd90a3408.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6a4c8a0b7622b3621900bf47acb16725c4a8dafde394f2bf2bf7112bd90a3408.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
C:\ALL YOUR FILES ARE ENCRYPTED.txt
buran
Targets
-
-
Target
6a4c8a0b7622b3621900bf47acb16725c4a8dafde394f2bf2bf7112bd90a3408.exe
-
Size
215KB
-
MD5
e71825acc5c0dbf948ec73b12c397a23
-
SHA1
efe7521f2f6f06840418ca99b57989ec7dd797c5
-
SHA256
6a4c8a0b7622b3621900bf47acb16725c4a8dafde394f2bf2bf7112bd90a3408
-
SHA512
c9369d2a89f54250149b3a92d1d12b2f1a38fcf76e961d08f5ea4c3aec29bc338d8d5113df0bdd35aed5ff2d4c2d71ac3195e27d72489d9275553833314d7fe5
-
SSDEEP
6144:cyJE1yd7WEJmcyf70PWna4DQFu/U3buRKlemZ9DnGAevIGn+:cU/d7WRvIPWa4DQFu/U3buRKlemZ9DnG
Score10/10-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-