Resubmissions

14-03-2024 08:31

240314-ke728afa2x 10

14-03-2024 08:26

240314-kb8vcaha74 10

General

  • Target

    2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer

  • Size

    80KB

  • MD5

    13616e15e6e161bf2c187d4ccff0a74a

  • SHA1

    5dc358621f84c54e25a5127e6c75873b302878c0

  • SHA256

    c16db5977b4fc0999e81d73641a520b05384431102acc29a3976b47bbad97751

  • SHA512

    e65ec8a0258f0046801e84785355c379aaf375b05bf0759bb49d8a89fc289a1ff446d978842f03de96aa76eb07484c92bcf9e7118665f2c2ffc60384c078e41e

  • SSDEEP

    1536:nc2hl9N/IolKfGsrQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG24m:nc2N/4usrQLOJgY8Zp8LHD4XWaNH71dc

Score
10/10

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer
    .exe windows:6 windows x86 arch:x86

    0e862ef2a0aafa9e540df6fa0394f682


    Headers

    Imports

    Sections