- Distribution Method : Unknown
- MD5 : 9478050023c7f8668df4fc39b0ddd79c
- Major Detection Name : Ransomware/Win.Babuk.R418947 (AhnLab V3), Ransom:Win32/Babuk.MAK!MTB (Microsoft)
- Encrypted File Pattern : .babyk
- Payment Instruction File : How To Restore Your Files.txt
- Major Characteristics :
- Offline Encryption
- Recovery Partition (M:\) + EFI System Partition (N:\) drives are activate.
- Block processes execution (agntsvc.exe, dbsnmp.exe, mydesktopservice.exe, oracle.exe, sql.exe, xfssvccon.exe etc.)
- Stop multi services (AcronisAgent, BackupExecVSSProvider, DefWatch, RTVscan, sophos, VeeamNFSSvc etc.)
- Disable system restore (vssadmin.exe delete shadows /all /quiet)
List