General
-
Target
2024-11-03_2298d910b2d34e870e0f561eda4dcfc6_babuk_destroyer
-
Size
79KB
-
Sample
241103-y4y3hawlgq
-
MD5
2298d910b2d34e870e0f561eda4dcfc6
-
SHA1
078b2cace5161e34aaaaeba6bfbe3f6259651f34
-
SHA256
bb845cf9c1674452a995f58b3971c04fd67a0a8d256288e58cb4454bb80a5efe
-
SHA512
6465216a71c116321a6e7d9e1746247cfe1c29a5897422f13ed55cfb3a0daa42ba673a7cc308bf5440c6bf5fb084d065a6b4aab84c11ca1d81fdf23c09cbfe33
-
SSDEEP
1536:N8WkWBeG/vEbmsrQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG2nsf:lBeQsmsrQLOJgY8Zp8LHD4XWaNH71dLc
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-03_2298d910b2d34e870e0f561eda4dcfc6_babuk_destroyer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-03_2298d910b2d34e870e0f561eda4dcfc6_babuk_destroyer.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2024-11-03_2298d910b2d34e870e0f561eda4dcfc6_babuk_destroyer
-
Size
79KB
-
MD5
2298d910b2d34e870e0f561eda4dcfc6
-
SHA1
078b2cace5161e34aaaaeba6bfbe3f6259651f34
-
SHA256
bb845cf9c1674452a995f58b3971c04fd67a0a8d256288e58cb4454bb80a5efe
-
SHA512
6465216a71c116321a6e7d9e1746247cfe1c29a5897422f13ed55cfb3a0daa42ba673a7cc308bf5440c6bf5fb084d065a6b4aab84c11ca1d81fdf23c09cbfe33
-
SSDEEP
1536:N8WkWBeG/vEbmsrQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG2nsf:lBeQsmsrQLOJgY8Zp8LHD4XWaNH71dLc
-
Babuk family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (173) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-