Analysis
-
max time kernel
142s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 13:33
Behavioral task
behavioral1
Sample
Diln External V3.exe
Resource
win7-20240221-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
Diln External V3.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
Diln External V3.exe
-
Size
426KB
-
MD5
c600a79fd780a84a5fed6af7c03767b7
-
SHA1
dcf2a842ebdd284136ad29915e5bc2541cef306d
-
SHA256
bf4391a80d1b0062f1f8bab43759981d971a5e8319aefb65273f3d276130c1fb
-
SHA512
188ec0ace793cf024cc3cad564e6832e3564c119dbbb3313f038d45e5df7dde2aed6bf3a83ba9cfb9591b99e4dc46f0d302731d8a2ef5508049983b37e5e57b2
-
SSDEEP
12288:HLdcfxaeM6fy/KaVUtgKkTZ73coNRJmj:rkIZGSAtgN+eJmj
Score
10/10
Malware Config
Extracted
Family
babylonrat
C2
178.237.233.106
Signatures
-
Babylon RAT
Babylon RAT is remote access trojan written in C++.
-
resource yara_rule behavioral1/memory/1708-0-0x0000000000CF0000-0x0000000000DDC000-memory.dmp upx behavioral1/memory/3032-1-0x0000000000CF0000-0x0000000000DDC000-memory.dmp upx behavioral1/memory/1708-2-0x0000000000CF0000-0x0000000000DDC000-memory.dmp upx behavioral1/memory/3032-3-0x0000000000CF0000-0x0000000000DDC000-memory.dmp upx behavioral1/memory/1708-5-0x0000000000CF0000-0x0000000000DDC000-memory.dmp upx behavioral1/memory/1708-7-0x0000000000CF0000-0x0000000000DDC000-memory.dmp upx -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1708 Diln External V3.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeShutdownPrivilege 1708 Diln External V3.exe Token: SeDebugPrivilege 1708 Diln External V3.exe Token: SeTcbPrivilege 1708 Diln External V3.exe Token: SeShutdownPrivilege 3032 Diln External V3.exe Token: SeDebugPrivilege 3032 Diln External V3.exe Token: SeTcbPrivilege 3032 Diln External V3.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1708 Diln External V3.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1708 wrote to memory of 3032 1708 Diln External V3.exe 28 PID 1708 wrote to memory of 3032 1708 Diln External V3.exe 28 PID 1708 wrote to memory of 3032 1708 Diln External V3.exe 28 PID 1708 wrote to memory of 3032 1708 Diln External V3.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Diln External V3.exe"C:\Users\Admin\AppData\Local\Temp\Diln External V3.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\Diln External V3.exe"C:\Users\Admin\AppData\Local\Temp\Diln External V3.exe" 17082⤵
- Suspicious use of AdjustPrivilegeToken
PID:3032
-