General

  • Target

    2024-04-12_44fcd277d0a92c0b7eafd911ccc93864_babuk_destroyer

  • Size

    71KB

  • MD5

    44fcd277d0a92c0b7eafd911ccc93864

  • SHA1

    6beed4cec39a2f126738e9a8909cd84f4edb5736

  • SHA256

    e36819a304d8eb00a404b3ff1dce1f708de985ca87f56e8c571a4a14740ffd62

  • SHA512

    2b6085c757242f552b1db42e9353c41d9ff8c5f7b9cc69ee4441087862a16487ccc58690d08487fdb5fc9e8072b275bf74085ee901727fdd2eacdc4fa5eadf04

  • SSDEEP

    1536:AXcbhZMBIWhuUsrQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG2AH:lhZEVsrQLOJgY8Zp8LHD4XWaNH71dLdS

Score
10/10

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-12_44fcd277d0a92c0b7eafd911ccc93864_babuk_destroyer
    .exe windows:6 windows x86 arch:x86

    202fa14f574c71c2f95878e40a79322d


    Headers

    Imports

    Sections