General
-
Target
21455636188.zip
-
Size
196KB
-
Sample
250219-m265jszlaq
-
MD5
484f2c6ce34fc47996931ca220ea7924
-
SHA1
75d16219b24a0edcd0b97849f51e56fcf21a8975
-
SHA256
11ad4ca7c9fa415283e0c81563b0e0f900b3afabf2384f50387f5f5bef0b45f3
-
SHA512
f5850fcf7d35debb828d534d6ec8a760b93300759a6e21f3cac6a6f01df326d62bbd78bc54c21e23b690f47b69d40f12b8fcadbeb9bbdf6e817d4ee00e02e844
-
SSDEEP
3072:LpQq47JHuhw/u/+Sk+uFO1LskrcCzQgTXDmVX9C0l+Unrsai0Hjus8+LADvm8:LaqtWyJugCKXTTmi0lRwai0HzHkvl
Behavioral task
behavioral1
Sample
Babuk.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Babuk.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
C:\3OYkmrLQx.README.txt
https://utox.org/
https://utox.org/uTox_win64.exe
Extracted
C:\3OYkmrLQx.README.txt
https://utox.org/
https://utox.org/uTox_win64.exe
Targets
-
-
Target
Babuk.exe
-
Size
147KB
-
MD5
2a12f8be64c05a4b1961409b872db68d
-
SHA1
3dc78907b4fc64cb6fcde3186ae60e0fb92834a7
-
SHA256
8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21
-
SHA512
1644815bb6ebbf913a3bafbab597f5f482fdf1dd16e2ed70a30b464db28ef4d69ae5b46058e416ba4378d70e28595b64cb9afe847e8402a3f52f9643df32200c
-
SSDEEP
3072:kqJogYkcSNm9V7D4TEkRPNK3ZYuF33QT:kq2kc4m9tD4XJIZX5
Score10/10-
Renames multiple (315) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-