General

  • Target

    2024-01-22_adac9472603f39d6b281b74a58b663c7_babuk_destroyer

  • Size

    79KB

  • MD5

    adac9472603f39d6b281b74a58b663c7

  • SHA1

    726c5226e75231d8681a98506ffff2f6338a9214

  • SHA256

    8ddc5eac9011bc41c92d876aacf228a54b0dc356310f8067ca95532a2e1a7f76

  • SHA512

    d4aa80ecbd474553c77336bfdb269c1c2c1d6b00b067b3723097dcbe599fcf7132ac5e41313973f6603259014f755932954c1f405c7943efa79e7733c7d5deeb

  • SSDEEP

    1536:gOkWBeG/vEbmsrQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG2nsf:LBeQsmsrQLOJgY8Zp8LHD4XWaNH71dLc

Score
10/10

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-22_adac9472603f39d6b281b74a58b663c7_babuk_destroyer
    .exe windows:6 windows x86 arch:x86

    202fa14f574c71c2f95878e40a79322d


    Headers

    Imports

    Sections