General

  • Target

    NEAS.3dd1804a642a4d96777a807dc9e5ae10.exe

  • Size

    1.5MB

  • Sample

    231105-lxeztsgb27

  • MD5

    3dd1804a642a4d96777a807dc9e5ae10

  • SHA1

    972d878cf92f3db5bb503bbce1d3cc8500e3da10

  • SHA256

    9cee271113b514769f1f475d53dc1bbf233044c0fec11038b027a563420d2d2b

  • SHA512

    a2f508e1de292a77a184a6f421c49b2546ddfee0eb566868646274159d30af0ee20405015d8eb3899697d2005d81c1357ec5b0a749bb30bbe1125a5c33311e19

  • SSDEEP

    24576:dbCj2sObHtqQ4QqH0XlE654b4fX3fo8wBgNcP:dbCjPKNqQqH0XSucl

Score
10/10

Malware Config

Targets

    • Target

      NEAS.3dd1804a642a4d96777a807dc9e5ae10.exe

    • Size

      1.5MB

    • MD5

      3dd1804a642a4d96777a807dc9e5ae10

    • SHA1

      972d878cf92f3db5bb503bbce1d3cc8500e3da10

    • SHA256

      9cee271113b514769f1f475d53dc1bbf233044c0fec11038b027a563420d2d2b

    • SHA512

      a2f508e1de292a77a184a6f421c49b2546ddfee0eb566868646274159d30af0ee20405015d8eb3899697d2005d81c1357ec5b0a749bb30bbe1125a5c33311e19

    • SSDEEP

      24576:dbCj2sObHtqQ4QqH0XlE654b4fX3fo8wBgNcP:dbCjPKNqQqH0XSucl

    Score
    10/10
    • Babylon RAT

      Babylon RAT is remote access trojan written in C++.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks