General

  • Target

    2024-04-30_4bc6365a36b744cb3a3666543700d334_babuk_destroyer

  • Size

    80KB

  • MD5

    4bc6365a36b744cb3a3666543700d334

  • SHA1

    6ef250a41820e99547c8001ea3a5a2c6defb6730

  • SHA256

    2c508854c7699c98c98c6c51a5372e7a60a39d5379069f6b7464a76dd511c2f9

  • SHA512

    588c38454d9992da8ba88073a4c826dd82547929dd0717f617d29eac60f730300d77779f9796dbed8961be94741c4ffb3544f2cbf855bd6fae6825940a112e36

  • SSDEEP

    1536:cvV9N/IUx1fSsrQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG24m:IN/D6srQLOJgY8Zp8LHD4XWaNH71dLdy

Score
10/10

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-30_4bc6365a36b744cb3a3666543700d334_babuk_destroyer
    .exe windows:6 windows x86 arch:x86

    0e862ef2a0aafa9e540df6fa0394f682


    Headers

    Imports

    Sections