General
-
Target
2024-09-04_10a746200164524d5e4e44abc2ddc5ea_babuk_destroyer
-
Size
79KB
-
Sample
240904-arabls1crq
-
MD5
10a746200164524d5e4e44abc2ddc5ea
-
SHA1
7d0f165804baa92b14a184da7f84da322d620939
-
SHA256
f89066114c3062fa3ed6049ee2662ced47f725cd383fdbde1049b413e58faa82
-
SHA512
1290db2165066ac08baed1e6afa3bd73d84062a4e05e71b8457e35a33ccd919eb4d2f4ef49f57d59a5de7d83d47b09152d7d8f292b802db4ae284348dba03145
-
SSDEEP
1536:PJkWBeGovEb+srQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG2vsf0:DBeJs+srQLOJgY8Zp8LHD4XWaNH71dLH
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-04_10a746200164524d5e4e44abc2ddc5ea_babuk_destroyer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-04_10a746200164524d5e4e44abc2ddc5ea_babuk_destroyer.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
2024-09-04_10a746200164524d5e4e44abc2ddc5ea_babuk_destroyer
-
Size
79KB
-
MD5
10a746200164524d5e4e44abc2ddc5ea
-
SHA1
7d0f165804baa92b14a184da7f84da322d620939
-
SHA256
f89066114c3062fa3ed6049ee2662ced47f725cd383fdbde1049b413e58faa82
-
SHA512
1290db2165066ac08baed1e6afa3bd73d84062a4e05e71b8457e35a33ccd919eb4d2f4ef49f57d59a5de7d83d47b09152d7d8f292b802db4ae284348dba03145
-
SSDEEP
1536:PJkWBeGovEb+srQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG2vsf0:DBeJs+srQLOJgY8Zp8LHD4XWaNH71dLH
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (197) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-