General

  • Target

    NEAS.214bd509bb4b86749e39192115396850_JC.exe

  • Size

    1.5MB

  • Sample

    231016-vdsk9aaf4z

  • MD5

    214bd509bb4b86749e39192115396850

  • SHA1

    a5d0c4cc239a9d65983c270c36f5ce0ca57fa724

  • SHA256

    a923aceba6caa25d54de48700a4b6cdd8212da7c2cf9d97f0f51b9d373bc331f

  • SHA512

    6d435d9a17fa3d15b3a5cb70ca3108251908c51c8e0cb88796e97ffa979c90ba9c2d4f9fa5cda3628aeeaaa0eabb62144f003f8eb99cf40c975e60a8006d48b4

  • SSDEEP

    24576:dbCj2sObHtqQ4QqH0XlE654b4fX3fo8wBgNcf:dbCjPKNqQqH0XSuc9

Score
10/10

Malware Config

Targets

    • Target

      NEAS.214bd509bb4b86749e39192115396850_JC.exe

    • Size

      1.5MB

    • MD5

      214bd509bb4b86749e39192115396850

    • SHA1

      a5d0c4cc239a9d65983c270c36f5ce0ca57fa724

    • SHA256

      a923aceba6caa25d54de48700a4b6cdd8212da7c2cf9d97f0f51b9d373bc331f

    • SHA512

      6d435d9a17fa3d15b3a5cb70ca3108251908c51c8e0cb88796e97ffa979c90ba9c2d4f9fa5cda3628aeeaaa0eabb62144f003f8eb99cf40c975e60a8006d48b4

    • SSDEEP

      24576:dbCj2sObHtqQ4QqH0XlE654b4fX3fo8wBgNcf:dbCjPKNqQqH0XSuc9

    Score
    10/10
    • Babylon RAT

      Babylon RAT is remote access trojan written in C++.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks