General

  • Target

    2024-04-19_d5eaa5c4f55781bc3f161e7c583e45c4_babuk_destroyer

  • Size

    79KB

  • MD5

    d5eaa5c4f55781bc3f161e7c583e45c4

  • SHA1

    d3796032c80f40cd7e1c6c8b5896ac8945c3eee1

  • SHA256

    adb10da10d9e2cc882bfadf2210a6cb2fdc62308470200401ffe869c01405995

  • SHA512

    5ae0af58d804e8f1ec624d1f4ea68a625d75373d14c73ea7ce8f0a988c0427a69138fa8ceeab978f7db3c246a44169fa33aa79107897c94b483cd657bde176ff

  • SSDEEP

    1536:apoUyFydC/ZbtsrQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG2ncf:1UyFydC/NtsrQLOJgY8Zp8LHD4XWaNHY

Score
10/10

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-19_d5eaa5c4f55781bc3f161e7c583e45c4_babuk_destroyer
    .exe windows:6 windows x86 arch:x86

    202fa14f574c71c2f95878e40a79322d


    Headers

    Imports

    Sections