General

  • Target

    e_win.bin.zip

  • Size

    26KB

  • Sample

    210819-t93ba6qst2

  • MD5

    a4eb7c740a81182cb897e28f6e73c968

  • SHA1

    e566dec3bbd28f64db42e06f0fe7347f741f2363

  • SHA256

    7f70c9a586b7ee09f1bff4f642381d5ed72af47381da2f535363776fd30d024b

  • SHA512

    a2f578b52890ddfdf0b603865edbee7c99001b2d078c1ac75bd4e3a60bf1dede1a143571a4b76fbebf864e609ed726941732caebf6922c2b5e0a9dd8ece8d109

Score
10/10

Malware Config

Targets

    • Target

      e_win.bin

    • Size

      79KB

    • MD5

      6ce7f33dc923d162788aa3236483701c

    • SHA1

      97395d6f9474638c0d97596a0613aaea04daa547

    • SHA256

      e2dc8fb92ff49643931fe736d002d42f2fb86ba5642ebf44ecbec674a77d8227

    • SHA512

      0d5ac1d3e3e1ee34c94af6288f82ae663f32fb1383aa6b85f16a6691a139743e16f5a25cfcabbc8428d564cb297d90a381a2863c162a01876779c017ae2141df

    Score
    10/10
    • Babuk Locker

      RaaS first seen in 2021 initially called Vasa Locker.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

File Deletion

2
T1107

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Impact

Inhibit System Recovery

2
T1490

Tasks