General
-
Target
2024-08-13_b97789f5e43131e57253c63c3f646715_babuk_destroyer
-
Size
79KB
-
Sample
240813-b1bfpsxeje
-
MD5
b97789f5e43131e57253c63c3f646715
-
SHA1
5c11d5e8bfcf5518107039c373baabc23115b3af
-
SHA256
2d5213ab289a6fba4764904f7f06b16ca8f31f5593370efa148feb679095f061
-
SHA512
bc6092e1feda452eebe4065545188536f231afb8ee888ed7277ce056600a5d05071fb111c424c32cecdfac6f10a72bc78059be2b707a8f8177f192e452acedb0
-
SSDEEP
1536:9k6UhZM4hubesrQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG2zs4:QhZ5YesrQLOJgY8Zp8LHD4XWaNH71dLI
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-13_b97789f5e43131e57253c63c3f646715_babuk_destroyer.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-13_b97789f5e43131e57253c63c3f646715_babuk_destroyer.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\PerfLogs\Admin\How To Restore Your Files.txt
Targets
-
-
Target
2024-08-13_b97789f5e43131e57253c63c3f646715_babuk_destroyer
-
Size
79KB
-
MD5
b97789f5e43131e57253c63c3f646715
-
SHA1
5c11d5e8bfcf5518107039c373baabc23115b3af
-
SHA256
2d5213ab289a6fba4764904f7f06b16ca8f31f5593370efa148feb679095f061
-
SHA512
bc6092e1feda452eebe4065545188536f231afb8ee888ed7277ce056600a5d05071fb111c424c32cecdfac6f10a72bc78059be2b707a8f8177f192e452acedb0
-
SSDEEP
1536:9k6UhZM4hubesrQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG2zs4:QhZ5YesrQLOJgY8Zp8LHD4XWaNH71dLI
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (208) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-