General

  • Target

    2024-02-22_f22edd18744b5a25c2cd4764f78713ec_babuk_destroyer

  • Size

    77KB

  • MD5

    f22edd18744b5a25c2cd4764f78713ec

  • SHA1

    66bb7e5c164f3d3fd2df946b7c4901db8346c2fa

  • SHA256

    035bc3d2f411313a64f4eabc13e490a7bf15c15c3edd39dccfe9dfc99fda53f6

  • SHA512

    32794e4bc88ecfeb9fa03437b51c0bd16282614dcd6b532702c2cd3499bdea6a66c1b1ba7403b99653ee7e7e03b1b83ee03836f3f6344ca2eb3d9066d73f1f6d

  • SSDEEP

    1536:F8JggrnO854WQgEksrQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG2Oa:yggrH4WQgFsrQLOJgY8Zp8LHD4XWaNHq

Score
10/10

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_f22edd18744b5a25c2cd4764f78713ec_babuk_destroyer
    .exe windows:6 windows x86 arch:x86

    c8767c12b94c40777e90a614a2e23303


    Headers

    Imports

    Sections