General

  • Target

    NEAS.09ea03e8c52f570a3280df56a4c89870.exe

  • Size

    1.5MB

  • Sample

    231102-t2s19afc3w

  • MD5

    09ea03e8c52f570a3280df56a4c89870

  • SHA1

    7f2c36d6d7395727a227cfda507f529db4eeea2d

  • SHA256

    405d0abdc05b495dcf477ccc1e6e51cb73a0df1712b7789fef6cf261d89746d7

  • SHA512

    ad753740ceb6859dce81478cd0dc9f0a010aeb9bfca86adbcbc81639239f7f902cf4f814555f0746e2007fc9d843a4e71c2c225ce827ae0fd8e32e4d74a32aaa

  • SSDEEP

    24576:dbCj2sObHtqQ4QqH0XlE654b4fX3fo8wBgNca:dbCjPKNqQqH0XSucU

Score
10/10

Malware Config

Targets

    • Target

      NEAS.09ea03e8c52f570a3280df56a4c89870.exe

    • Size

      1.5MB

    • MD5

      09ea03e8c52f570a3280df56a4c89870

    • SHA1

      7f2c36d6d7395727a227cfda507f529db4eeea2d

    • SHA256

      405d0abdc05b495dcf477ccc1e6e51cb73a0df1712b7789fef6cf261d89746d7

    • SHA512

      ad753740ceb6859dce81478cd0dc9f0a010aeb9bfca86adbcbc81639239f7f902cf4f814555f0746e2007fc9d843a4e71c2c225ce827ae0fd8e32e4d74a32aaa

    • SSDEEP

      24576:dbCj2sObHtqQ4QqH0XlE654b4fX3fo8wBgNca:dbCjPKNqQqH0XSucU

    Score
    10/10
    • Babylon RAT

      Babylon RAT is remote access trojan written in C++.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks