General
-
Target
516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd.zip
-
Size
114KB
-
Sample
250125-1mq2nssqen
-
MD5
12bbe5c66309bef6c023efcd6c66ec49
-
SHA1
e0892183009a05e9d9e4569ffff0f6fd5270939c
-
SHA256
d6352812b8eb5834a74a1004bec9cdc16090556294d1c0312f1d82b7c1693e5f
-
SHA512
98133ed42404d9f2d5816ffb54358e6d593bdf6a0cea2e478a44c1fdad84f17ac5784b56832369dca71bb4eef1d22c37c2102d408f3c00e45945aeebe0b6ff77
-
SSDEEP
3072:x4hw/Y9X+9jbwV4DjjBEHLxrqfc/HNaCEgEwzxChY8:xZkOlbS4DjjENqSNxEEzxCh/
Behavioral task
behavioral1
Sample
516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd.zip
Resource
win11-20241007-en
Malware Config
Extracted
C:\Program Files\dotnet\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Targets
-
-
Target
516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd.zip
-
Size
114KB
-
MD5
12bbe5c66309bef6c023efcd6c66ec49
-
SHA1
e0892183009a05e9d9e4569ffff0f6fd5270939c
-
SHA256
d6352812b8eb5834a74a1004bec9cdc16090556294d1c0312f1d82b7c1693e5f
-
SHA512
98133ed42404d9f2d5816ffb54358e6d593bdf6a0cea2e478a44c1fdad84f17ac5784b56832369dca71bb4eef1d22c37c2102d408f3c00e45945aeebe0b6ff77
-
SSDEEP
3072:x4hw/Y9X+9jbwV4DjjBEHLxrqfc/HNaCEgEwzxChY8:xZkOlbS4DjjENqSNxEEzxCh/
-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Buran family
-
Detects Zeppelin payload
-
Zeppelin Ransomware
Ransomware-as-a-service (RaaS) written in Delphi and first seen in 2019.
-
Zeppelin family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (6075) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-