General
-
Target
516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd.zip
-
Size
114KB
-
Sample
250125-1pnz4asrcj
-
MD5
12bbe5c66309bef6c023efcd6c66ec49
-
SHA1
e0892183009a05e9d9e4569ffff0f6fd5270939c
-
SHA256
d6352812b8eb5834a74a1004bec9cdc16090556294d1c0312f1d82b7c1693e5f
-
SHA512
98133ed42404d9f2d5816ffb54358e6d593bdf6a0cea2e478a44c1fdad84f17ac5784b56832369dca71bb4eef1d22c37c2102d408f3c00e45945aeebe0b6ff77
-
SSDEEP
3072:x4hw/Y9X+9jbwV4DjjBEHLxrqfc/HNaCEgEwzxChY8:xZkOlbS4DjjENqSNxEEzxCh/
Behavioral task
behavioral1
Sample
516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Program Files\Crashpad\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Targets
-
-
Target
516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd.exe
-
Size
211KB
-
MD5
f42abb7569dbc2ff5faa7e078cb71476
-
SHA1
04530a6165fc29ab536bab1be16f6b87c46288e6
-
SHA256
516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd
-
SHA512
3277534a02435538e144dea3476416e1d9117fcddef3dcb4379b82f33516c3e87767c3b0d2b880e61a3d803b583c96d772a0bdeecbfc109fe66444e9b29216af
-
SSDEEP
6144:zia1vcaEaA+HPsISAzG44DQFu/U3buRKlemZ9DnGAeWBES+:zHctWvVSAx4DQFu/U3buRKlemZ9DnGAn
-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Buran family
-
Detects Zeppelin payload
-
Zeppelin Ransomware
Ransomware-as-a-service (RaaS) written in Delphi and first seen in 2019.
-
Zeppelin family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (6109) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Indicator Removal
1File Deletion
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1