General
-
Target
2024-06-10_204253b2cf495b1304d529e4edcebaf0_babuk_destroyer
-
Size
79KB
-
Sample
240610-p6k4zswhjq
-
MD5
204253b2cf495b1304d529e4edcebaf0
-
SHA1
ce4c825685a546ead3037d6e8b69d40d19ba2705
-
SHA256
9d1382cfe812378d742424f3e4717cfee4fa90d1fe0c8067cdf998e9330c0e14
-
SHA512
4176076157eec99d41e657b347ea1c5c234fcf30cac54a004fb09c5b800b51b1604c7c2aacc60e20c262d51c9a88f66cb1ba91fa4c0f077bc01a107c878591b9
-
SSDEEP
1536:CukWBeGPGEbmsrQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG2nsf:dBeBsmsrQLOJgY8Zp8LHD4XWaNH71dLc
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-10_204253b2cf495b1304d529e4edcebaf0_babuk_destroyer.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-06-10_204253b2cf495b1304d529e4edcebaf0_babuk_destroyer.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-06-10_204253b2cf495b1304d529e4edcebaf0_babuk_destroyer
-
Size
79KB
-
MD5
204253b2cf495b1304d529e4edcebaf0
-
SHA1
ce4c825685a546ead3037d6e8b69d40d19ba2705
-
SHA256
9d1382cfe812378d742424f3e4717cfee4fa90d1fe0c8067cdf998e9330c0e14
-
SHA512
4176076157eec99d41e657b347ea1c5c234fcf30cac54a004fb09c5b800b51b1604c7c2aacc60e20c262d51c9a88f66cb1ba91fa4c0f077bc01a107c878591b9
-
SSDEEP
1536:CukWBeGPGEbmsrQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG2nsf:dBeBsmsrQLOJgY8Zp8LHD4XWaNH71dLc
Score10/10-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (193) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-