General
-
Target
2024-08-29_dc053caf95e8e0d08fe445b6bede2706_babuk_destroyer
-
Size
79KB
-
Sample
240829-jvwtfszhqg
-
MD5
dc053caf95e8e0d08fe445b6bede2706
-
SHA1
12966dc66e05296d5a731d2a4b535180d3f0d101
-
SHA256
854918956a53b2d39abbf67677bf8ad3c2f2506d6690162b8f8abe1655b9f957
-
SHA512
30cbf03b374aae658f33deee2b3259b213bbee14ac83660d30b1103ccf7222660f39128cc2fd57f446f64c8badfd33b73df7b9a76f9383fc509e5b6677cb6cb8
-
SSDEEP
1536:6ukWBeG/vEbmsrQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG2nsf:1BeQsmsrQLOJgY8Zp8LHD4XWaNH71dLc
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-29_dc053caf95e8e0d08fe445b6bede2706_babuk_destroyer.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-29_dc053caf95e8e0d08fe445b6bede2706_babuk_destroyer.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
2024-08-29_dc053caf95e8e0d08fe445b6bede2706_babuk_destroyer
-
Size
79KB
-
MD5
dc053caf95e8e0d08fe445b6bede2706
-
SHA1
12966dc66e05296d5a731d2a4b535180d3f0d101
-
SHA256
854918956a53b2d39abbf67677bf8ad3c2f2506d6690162b8f8abe1655b9f957
-
SHA512
30cbf03b374aae658f33deee2b3259b213bbee14ac83660d30b1103ccf7222660f39128cc2fd57f446f64c8badfd33b73df7b9a76f9383fc509e5b6677cb6cb8
-
SSDEEP
1536:6ukWBeG/vEbmsrQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG2nsf:1BeQsmsrQLOJgY8Zp8LHD4XWaNH71dLc
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (202) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-