General

  • Target

    NEAS.e74a826bc13f7434ebe3a01bf7d71e60.exe

  • Size

    1.5MB

  • Sample

    231113-dvfvcagg92

  • MD5

    e74a826bc13f7434ebe3a01bf7d71e60

  • SHA1

    6d3c4c354fe2832f7b8588581fb132c567a39509

  • SHA256

    4f33500221ec9e5b754e6e91113c8eaf2f92d1e07010253f453f07900fff0054

  • SHA512

    4ceb2875939604bc0d22e20bebaf8f5dfb333c7228719e453bede2cc1c53d69c80fb6193b094d6e97f77638fbf072972b463236bb1ec0ad7de0990096c94818d

  • SSDEEP

    24576:dbCj2sObHtqQ4QqH0XlE654b4fX3fo8wBgNce:dbCjPKNqQqH0XSuco

Score
10/10

Malware Config

Targets

    • Target

      NEAS.e74a826bc13f7434ebe3a01bf7d71e60.exe

    • Size

      1.5MB

    • MD5

      e74a826bc13f7434ebe3a01bf7d71e60

    • SHA1

      6d3c4c354fe2832f7b8588581fb132c567a39509

    • SHA256

      4f33500221ec9e5b754e6e91113c8eaf2f92d1e07010253f453f07900fff0054

    • SHA512

      4ceb2875939604bc0d22e20bebaf8f5dfb333c7228719e453bede2cc1c53d69c80fb6193b094d6e97f77638fbf072972b463236bb1ec0ad7de0990096c94818d

    • SSDEEP

      24576:dbCj2sObHtqQ4QqH0XlE654b4fX3fo8wBgNce:dbCjPKNqQqH0XSuco

    Score
    10/10
    • Babylon RAT

      Babylon RAT is remote access trojan written in C++.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks