General

  • Target

    Test2.exe

  • Size

    355KB

  • MD5

    7c06ee69dcf13a8242b92833ffd150bd

  • SHA1

    7449480548cf9c8c073cab0181be5defd5669663

  • SHA256

    f460741b752da6167c90fb9aa278f4efa7ebb1cad6ee366f62df9141fd50a767

  • SHA512

    af9454dc35816647ed2f2024e807699365098ab99399ecfbf38efe7fd8c7ba3074843ca2478fb9612c98dadc5c3f4ea77f71c83c6ad4f508bccefc9c0937d8d4

  • SSDEEP

    6144:tL1ncfWwN0oc35jeRh8Xqfy/Ka1OHAH0tMrKCTEABG+Z9d3cQT/9nR4Ioy19k:tLdcfxaeM6fy/KaVUtgKkTZ73coNRJk

Score
10/10

Malware Config

Extracted

Family

babylonrat

C2

192.168.1.136

Signatures

  • Babylonrat family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • Test2.exe
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections