General
-
Target
2024-09-04_37824a91b2270cb6650324a20d507172_babuk_destroyer
-
Size
79KB
-
Sample
240904-at3qyasemh
-
MD5
37824a91b2270cb6650324a20d507172
-
SHA1
2c3f4af881e40024542f8297bca4c7b7d78054b9
-
SHA256
ec81f7109626235ef8936707f33ed435cb5948bc60838e32e28e089331726618
-
SHA512
7487ed355a4f7cc7625034d9b86a3b3691003cfea3b1c4a2c318ceb115c2011dcbcbd5e19d248f51e895f555633903c60926af5387ba493c9ba22b22cf31022c
-
SSDEEP
1536:PJkWBeGovEb+srQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG2vsf0:DBeJs+srQLOJgY8Zp8LHD4XWaNH71dLH
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-04_37824a91b2270cb6650324a20d507172_babuk_destroyer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-04_37824a91b2270cb6650324a20d507172_babuk_destroyer.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
2024-09-04_37824a91b2270cb6650324a20d507172_babuk_destroyer
-
Size
79KB
-
MD5
37824a91b2270cb6650324a20d507172
-
SHA1
2c3f4af881e40024542f8297bca4c7b7d78054b9
-
SHA256
ec81f7109626235ef8936707f33ed435cb5948bc60838e32e28e089331726618
-
SHA512
7487ed355a4f7cc7625034d9b86a3b3691003cfea3b1c4a2c318ceb115c2011dcbcbd5e19d248f51e895f555633903c60926af5387ba493c9ba22b22cf31022c
-
SSDEEP
1536:PJkWBeGovEb+srQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG2vsf0:DBeJs+srQLOJgY8Zp8LHD4XWaNH71dLH
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (217) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-