General

  • Target

    d4b14e479e91f770b131d2384cfd31cd_JaffaCakes118

  • Size

    1.2MB

  • Sample

    240405-qg34yada6w

  • MD5

    d4b14e479e91f770b131d2384cfd31cd

  • SHA1

    4a1411e48dc79e2e294fc954b27fe0054287e7fa

  • SHA256

    ee97a007bb9f08a1c9eea55b9be8c0ee6ae17371446caabf114f2c1e508a8664

  • SHA512

    c796d298da80f74c058179cce0361b6ddee8058e5ffee207065b6d15bf515f615737530e79c4e20acd004aeadf16325d1ffb59c210c32e2a6ee8ba88c6c0e455

  • SSDEEP

    12288:+kYakDLEVZCZblRxwdy6AOHryftOR5r0B7Mtc0bGhGtL8H3:puLq6blRu/AOHlRCsc0KQt

Malware Config

Targets

    • Target

      d4b14e479e91f770b131d2384cfd31cd_JaffaCakes118

    • Size

      1.2MB

    • MD5

      d4b14e479e91f770b131d2384cfd31cd

    • SHA1

      4a1411e48dc79e2e294fc954b27fe0054287e7fa

    • SHA256

      ee97a007bb9f08a1c9eea55b9be8c0ee6ae17371446caabf114f2c1e508a8664

    • SHA512

      c796d298da80f74c058179cce0361b6ddee8058e5ffee207065b6d15bf515f615737530e79c4e20acd004aeadf16325d1ffb59c210c32e2a6ee8ba88c6c0e455

    • SSDEEP

      12288:+kYakDLEVZCZblRxwdy6AOHryftOR5r0B7Mtc0bGhGtL8H3:puLq6blRu/AOHlRCsc0KQt

    • Babylon RAT

      Babylon RAT is remote access trojan written in C++.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks