General

  • Target

    2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer

  • Size

    80KB

  • MD5

    7bb7c2899106b7c16b787c98c37ac8df

  • SHA1

    15ba68d29d846a9ea07ff0df4d84655cfce0a7a0

  • SHA256

    63e2ba3f181ba59f1926b7588d9c8d3d5589c15eb4354bc23348f22a49d04f9d

  • SHA512

    372dd659779b377a715c7f1b7dbffe76de3645289c6237550dbd07488b93ebbb287ff9e5d4ae4b28256db2418362652e7f5804d8d9b8850ca0c5dd4750dae28d

  • SSDEEP

    1536:mV9N/IUx1fSsrQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG24m:UN/D6srQLOJgY8Zp8LHD4XWaNH71dLdy

Score
10/10

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer
    .exe windows:6 windows x86 arch:x86

    0e862ef2a0aafa9e540df6fa0394f682


    Headers

    Imports

    Sections