General

  • Target

    NEAS.757d90d8c7aee1482dd03b57669f9cd0.exe

  • Size

    1.5MB

  • Sample

    231111-bd9d8ace51

  • MD5

    757d90d8c7aee1482dd03b57669f9cd0

  • SHA1

    85164cef35194c7938f90c4d418dd8daed96cd43

  • SHA256

    93db7ed57c674c3e48bcc41dae7e5881ca8f0816fa1a56a506e35844ddb24891

  • SHA512

    d2bd5bb470215ca84c473180454e04838df680d32bc66e63ef98222f89f0fe5fe891515c5ddee489f8dbe5e5ef02c476bf5f359857cbcda6d88ab67361722856

  • SSDEEP

    24576:dbCj2sObHtqQ4QqH0XlE654b4fX3fo8wBgNcF:dbCjPKNqQqH0XSucX

Score
10/10

Malware Config

Targets

    • Target

      NEAS.757d90d8c7aee1482dd03b57669f9cd0.exe

    • Size

      1.5MB

    • MD5

      757d90d8c7aee1482dd03b57669f9cd0

    • SHA1

      85164cef35194c7938f90c4d418dd8daed96cd43

    • SHA256

      93db7ed57c674c3e48bcc41dae7e5881ca8f0816fa1a56a506e35844ddb24891

    • SHA512

      d2bd5bb470215ca84c473180454e04838df680d32bc66e63ef98222f89f0fe5fe891515c5ddee489f8dbe5e5ef02c476bf5f359857cbcda6d88ab67361722856

    • SSDEEP

      24576:dbCj2sObHtqQ4QqH0XlE654b4fX3fo8wBgNcF:dbCjPKNqQqH0XSucX

    Score
    10/10
    • Babylon RAT

      Babylon RAT is remote access trojan written in C++.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks