General

  • Target

    Test.exe

  • Size

    355KB

  • Sample

    240418-raba1sfa74

  • MD5

    89c0fbec0261e383a1e37755e68cbecb

  • SHA1

    5856f4d2c1a2d7d7266207a7c7908cf54de7c8d9

  • SHA256

    c498dc13b46e86b01cf8647a23b0e69118c76c24d6e597c80d022b374d2f2a41

  • SHA512

    2d84197de5140b20dfc885388fca02ff11d0ef44975d1f042f863e4fe0b7bce59ea649ff28575c2d13a3f311eb6c6ffd4f54202e784b0df79705767b56937c39

  • SSDEEP

    6144:TL1ncfWwN0oc35jeRh8Xqfy/Ka1OHAH0tMrKCTEABG+Z9d3cQT/9nR4Ioy19AhU:TLdcfxaeM6fy/KaVUtgKkTZ73coNRJqU

Score
10/10

Malware Config

Extracted

Family

babylonrat

C2

192.168.1.136

Targets

    • Target

      Test.exe

    • Size

      355KB

    • MD5

      89c0fbec0261e383a1e37755e68cbecb

    • SHA1

      5856f4d2c1a2d7d7266207a7c7908cf54de7c8d9

    • SHA256

      c498dc13b46e86b01cf8647a23b0e69118c76c24d6e597c80d022b374d2f2a41

    • SHA512

      2d84197de5140b20dfc885388fca02ff11d0ef44975d1f042f863e4fe0b7bce59ea649ff28575c2d13a3f311eb6c6ffd4f54202e784b0df79705767b56937c39

    • SSDEEP

      6144:TL1ncfWwN0oc35jeRh8Xqfy/Ka1OHAH0tMrKCTEABG+Z9d3cQT/9nR4Ioy19AhU:TLdcfxaeM6fy/KaVUtgKkTZ73coNRJqU

    Score
    10/10
    • Babylon RAT

      Babylon RAT is remote access trojan written in C++.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks