General

  • Target

    NEAS.30092eaa28ce7d9e0bd8d20a4ed66ab0_JC.exe

  • Size

    1.5MB

  • Sample

    231026-3z8hlabd97

  • MD5

    30092eaa28ce7d9e0bd8d20a4ed66ab0

  • SHA1

    0e6126132504d3b204a66c01202604eafb9a8762

  • SHA256

    04c6488c5aa6e4db910982cc78d92fba56948fb2176b34b7a7b74ce09faee625

  • SHA512

    a29bdc5f3455ee30b751146b110430b9abb2fe0174e2be2b3952c466b5d4def5329f54d94a2e73d38ab513d25993f9d1589910408eedfed46a212ea26cdb23d0

  • SSDEEP

    24576:dbCj2sObHtqQ4QqH0XlE654b4fX3fo8wBgNcb:dbCjPKNqQqH0XSuct

Score
10/10

Malware Config

Targets

    • Target

      NEAS.30092eaa28ce7d9e0bd8d20a4ed66ab0_JC.exe

    • Size

      1.5MB

    • MD5

      30092eaa28ce7d9e0bd8d20a4ed66ab0

    • SHA1

      0e6126132504d3b204a66c01202604eafb9a8762

    • SHA256

      04c6488c5aa6e4db910982cc78d92fba56948fb2176b34b7a7b74ce09faee625

    • SHA512

      a29bdc5f3455ee30b751146b110430b9abb2fe0174e2be2b3952c466b5d4def5329f54d94a2e73d38ab513d25993f9d1589910408eedfed46a212ea26cdb23d0

    • SSDEEP

      24576:dbCj2sObHtqQ4QqH0XlE654b4fX3fo8wBgNcb:dbCjPKNqQqH0XSuct

    Score
    10/10
    • Babylon RAT

      Babylon RAT is remote access trojan written in C++.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks