General
-
Target
2024-11-12_fcf9da264da3bcb23f331b0c51568a66_babuk_destroyer
-
Size
79KB
-
Sample
241112-md7q6szhql
-
MD5
fcf9da264da3bcb23f331b0c51568a66
-
SHA1
6c59af9ef590d086209461239185a0ebca51f0a4
-
SHA256
a8afd616cbe42da1ec57320658b9289cce7884d41c65909e1cda3b9422d9c126
-
SHA512
b8a230d034501bf5d569e869f574ac34538db6419366a1827d7c06c4b813fadada3c3fa814853dec8fce7ee0c521a47ff127a1b5abd43316673f7df6bb521b8a
-
SSDEEP
1536:A2nhxMlpCK2979srQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG23i3:Rhx+I79srQLOJgY8Zp8LHD4XWaNH71d+
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-12_fcf9da264da3bcb23f331b0c51568a66_babuk_destroyer.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-11-12_fcf9da264da3bcb23f331b0c51568a66_babuk_destroyer.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2024-11-12_fcf9da264da3bcb23f331b0c51568a66_babuk_destroyer
-
Size
79KB
-
MD5
fcf9da264da3bcb23f331b0c51568a66
-
SHA1
6c59af9ef590d086209461239185a0ebca51f0a4
-
SHA256
a8afd616cbe42da1ec57320658b9289cce7884d41c65909e1cda3b9422d9c126
-
SHA512
b8a230d034501bf5d569e869f574ac34538db6419366a1827d7c06c4b813fadada3c3fa814853dec8fce7ee0c521a47ff127a1b5abd43316673f7df6bb521b8a
-
SSDEEP
1536:A2nhxMlpCK2979srQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG23i3:Rhx+I79srQLOJgY8Zp8LHD4XWaNH71d+
-
Babuk family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (232) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-