General
-
Target
79a67070f0fbff66cb39f3dadd3e3565b1b1b98ed9e079562aabd90d10ad75ac.zip.zip
-
Size
11.8MB
-
Sample
250115-d9cq8s1qfl
-
MD5
f357654acaf1552eee5f8f29740b3f4f
-
SHA1
8e7fea433082ccb25514b8d7cf8f6450ae351bd8
-
SHA256
ffd63e3db5a7d0a925491e917740b217de05c5c638a104463757afd507f4dbd6
-
SHA512
86d7d77c840ea0509fc4a02738eaed9e437aaf4bc668aa9fe6adeaaf374ca3abb87b5bf315f13bc51335e94057ce91ff6103882ad6583cb702b44993d42a657a
-
SSDEEP
196608:LMmYZZA6GvFG/2/0xo/hdN6fmvaA/kfK0vSCVlbn1e6cjlxbbH8lEfXPj9xfbnvx:eA7E/2/JZQCaAcv6WjQ6cjLXclEfXL9v
Behavioral task
behavioral1
Sample
79a67070f0fbff66cb39f3dadd3e3565b1b1b98ed9e079562aabd90d10ad75ac.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
79a67070f0fbff66cb39f3dadd3e3565b1b1b98ed9e079562aabd90d10ad75ac.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
79a67070f0fbff66cb39f3dadd3e3565b1b1b98ed9e079562aabd90d10ad75ac.exe
-
Size
12.0MB
-
MD5
59d018958d77ee68568eac6250a4224e
-
SHA1
a5ac1b794b33da74b7d587b04394721f7aa96d0f
-
SHA256
79a67070f0fbff66cb39f3dadd3e3565b1b1b98ed9e079562aabd90d10ad75ac
-
SHA512
5f285f3920463646a77487c9e0b1c46ebe950f779fafb524d6064aa280ba84c3119cd19c2b88f3011e20a7f7b70a1341103d42baca28f1781d8670bca8737881
-
SSDEEP
393216:VobaG+ZUoC9EYeWJ8taL/d2otNCk2rszUXS:VMaG+Z7C9M+RJ2ontkXS
-
Babuk family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (211) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-