General

  • Target

    2024-06-23_702fd60faabd529ca674d806564c36b1_babuk_destroyer

  • Size

    79KB

  • MD5

    702fd60faabd529ca674d806564c36b1

  • SHA1

    7f22bb89b1293405201cf4ce0816b5714fc9576a

  • SHA256

    3d893337a014bd80b29fcd1d1b11d55d8cd245061d250d61a2d1207c6a959eba

  • SHA512

    b0685f2855da7c18da9e723b517b74300b0976b5ea10e2c8b0205608aa74cbc69f9349dbb5a6565ec12e7dfa913e9296a13866f90c58102e235b6b03d12c763b

  • SSDEEP

    1536:b+qxi5vmhs2bxsrQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG2nC3:hxiJ2xsrQLOJgY8Zp8LHD4XWaNH71dLy

Score
10/10

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-23_702fd60faabd529ca674d806564c36b1_babuk_destroyer
    .exe windows:6 windows x86 arch:x86

    202fa14f574c71c2f95878e40a79322d


    Headers

    Imports

    Sections