General

  • Target

    Test2.exe

  • Size

    355KB

  • Sample

    240419-qf72haec5z

  • MD5

    7c06ee69dcf13a8242b92833ffd150bd

  • SHA1

    7449480548cf9c8c073cab0181be5defd5669663

  • SHA256

    f460741b752da6167c90fb9aa278f4efa7ebb1cad6ee366f62df9141fd50a767

  • SHA512

    af9454dc35816647ed2f2024e807699365098ab99399ecfbf38efe7fd8c7ba3074843ca2478fb9612c98dadc5c3f4ea77f71c83c6ad4f508bccefc9c0937d8d4

  • SSDEEP

    6144:tL1ncfWwN0oc35jeRh8Xqfy/Ka1OHAH0tMrKCTEABG+Z9d3cQT/9nR4Ioy19k:tLdcfxaeM6fy/KaVUtgKkTZ73coNRJk

Score
10/10

Malware Config

Extracted

Family

babylonrat

C2

192.168.1.136

Targets

    • Target

      Test2.exe

    • Size

      355KB

    • MD5

      7c06ee69dcf13a8242b92833ffd150bd

    • SHA1

      7449480548cf9c8c073cab0181be5defd5669663

    • SHA256

      f460741b752da6167c90fb9aa278f4efa7ebb1cad6ee366f62df9141fd50a767

    • SHA512

      af9454dc35816647ed2f2024e807699365098ab99399ecfbf38efe7fd8c7ba3074843ca2478fb9612c98dadc5c3f4ea77f71c83c6ad4f508bccefc9c0937d8d4

    • SSDEEP

      6144:tL1ncfWwN0oc35jeRh8Xqfy/Ka1OHAH0tMrKCTEABG+Z9d3cQT/9nR4Ioy19k:tLdcfxaeM6fy/KaVUtgKkTZ73coNRJk

    Score
    10/10
    • Babylon RAT

      Babylon RAT is remote access trojan written in C++.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks