General

  • Target

    2024-06-12_43afc33c22aca7bb2733e070866b2ecb_babuk_destroyer

  • Size

    29KB

  • MD5

    43afc33c22aca7bb2733e070866b2ecb

  • SHA1

    110a2b81176df5e1cd3ddb04fc9372f144a049ba

  • SHA256

    136500d3fec4fd9e7f39f10aa754ba00c3bf2d4ceea10261c63f4cd0fdb945e7

  • SHA512

    c7dbe32095a94fe83f1c5b892ba858be6fd19637d75730e6ab5681e1ce8b6919a28c58623d8782a32aee81c49f29627d834039c988d728eb6b43a48b89646f32

  • SSDEEP

    384:I2UsMH+Sc5xjfd7IRfj1LKWQkD/e42pRwtkOEyOc0QI0rZw+:kscI5x5kTKWQY/e42pKtkOETcfJr

Score
10/10

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-12_43afc33c22aca7bb2733e070866b2ecb_babuk_destroyer
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections