General

  • Target

    NEAS.e0c99e3b9fd048c8d0b45d5396991ec0_JC.exe

  • Size

    1.5MB

  • Sample

    231105-elzrjace83

  • MD5

    e0c99e3b9fd048c8d0b45d5396991ec0

  • SHA1

    520d1d96cd24b09944df03785e491269f80c4175

  • SHA256

    fb3c9669792f4836dbaeeb8da474e82e216b9683232332a1357f2a762c935f5f

  • SHA512

    7d1939d5ac3477a5881fa336fcaaf08229ca062635a5e2d45c2998d0a94e9e34e3a94a24513cdbcb6716b8665f28d425a1f8b461a489506c31b88188b6af9095

  • SSDEEP

    24576:dbCj2sObHtqQ4QqH0XlE654b4fX3fo8wBgNcC:dbCjPKNqQqH0XSucw

Score
10/10

Malware Config

Targets

    • Target

      NEAS.e0c99e3b9fd048c8d0b45d5396991ec0_JC.exe

    • Size

      1.5MB

    • MD5

      e0c99e3b9fd048c8d0b45d5396991ec0

    • SHA1

      520d1d96cd24b09944df03785e491269f80c4175

    • SHA256

      fb3c9669792f4836dbaeeb8da474e82e216b9683232332a1357f2a762c935f5f

    • SHA512

      7d1939d5ac3477a5881fa336fcaaf08229ca062635a5e2d45c2998d0a94e9e34e3a94a24513cdbcb6716b8665f28d425a1f8b461a489506c31b88188b6af9095

    • SSDEEP

      24576:dbCj2sObHtqQ4QqH0XlE654b4fX3fo8wBgNcC:dbCjPKNqQqH0XSucw

    Score
    10/10
    • Babylon RAT

      Babylon RAT is remote access trojan written in C++.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks