Resubmissions

10-06-2024 12:56

240610-p6k4zswhjq 10

10-06-2024 12:48

240610-p189maware 10

General

  • Target

    2024-06-10_204253b2cf495b1304d529e4edcebaf0_babuk_destroyer

  • Size

    79KB

  • MD5

    204253b2cf495b1304d529e4edcebaf0

  • SHA1

    ce4c825685a546ead3037d6e8b69d40d19ba2705

  • SHA256

    9d1382cfe812378d742424f3e4717cfee4fa90d1fe0c8067cdf998e9330c0e14

  • SHA512

    4176076157eec99d41e657b347ea1c5c234fcf30cac54a004fb09c5b800b51b1604c7c2aacc60e20c262d51c9a88f66cb1ba91fa4c0f077bc01a107c878591b9

  • SSDEEP

    1536:CukWBeGPGEbmsrQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG2nsf:dBeBsmsrQLOJgY8Zp8LHD4XWaNH71dLc

Score
10/10

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-10_204253b2cf495b1304d529e4edcebaf0_babuk_destroyer
    .exe windows:6 windows x86 arch:x86

    202fa14f574c71c2f95878e40a79322d


    Headers

    Imports

    Sections