Check out our video library AppCheck defending against newest ransomware, automatic recovery and real-time backup.

  • Distribution Method : Unknown
  • MD5 : 9478050023c7f8668df4fc39b0ddd79c
  • Major Detection Name : Ransomware/Win.Babuk.R418947 (AhnLab V3), Ransom:Win32/Babuk.MAK!MTB (Microsoft)
  • Encrypted File Pattern : .babyk
  • Payment Instruction File : How To Restore Your Files.txt
  • Major Characteristics :
     - Offline Encryption
     - Recovery Partition (M:\) + EFI System Partition (N:\) drives are activate.
     - Block processes execution (agntsvc.exe, dbsnmp.exe, mydesktopservice.exe, oracle.exe, sql.exe, xfssvccon.exe etc.)
     - Stop multi services (AcronisAgent, BackupExecVSSProvider, DefWatch, RTVscan, sophos, VeeamNFSSvc etc.)
     - Disable system restore (vssadmin.exe delete shadows /all /quiet)