General

  • Target

    Diln V1.exe

  • Size

    426KB

  • Sample

    240420-ktaehach93

  • MD5

    a47a2e153ea58592d6b1af508d141887

  • SHA1

    575f13613d90f3b1f6fae9379413f9b21d432c11

  • SHA256

    b84ac29cbfcb743b84c24bb7eeb2d237c7e871c433c5d28122376ea4a8ff35fb

  • SHA512

    26f6d7f0ee5354d2f343670180316fe08a2c90e44faa55be1bbb1f6b0ef579bfb957dae5668c2aba6a3715250b958ecef4c360f5fa43b5207cbb1405fe094a16

  • SSDEEP

    12288:kLdcfxaeM6fy/KaVUtgKkTZ73coNRJn0:QkIZGSAtgN+eJn0

Score
10/10

Malware Config

Extracted

Family

babylonrat

C2

91.242.155.129

Targets

    • Target

      Diln V1.exe

    • Size

      426KB

    • MD5

      a47a2e153ea58592d6b1af508d141887

    • SHA1

      575f13613d90f3b1f6fae9379413f9b21d432c11

    • SHA256

      b84ac29cbfcb743b84c24bb7eeb2d237c7e871c433c5d28122376ea4a8ff35fb

    • SHA512

      26f6d7f0ee5354d2f343670180316fe08a2c90e44faa55be1bbb1f6b0ef579bfb957dae5668c2aba6a3715250b958ecef4c360f5fa43b5207cbb1405fe094a16

    • SSDEEP

      12288:kLdcfxaeM6fy/KaVUtgKkTZ73coNRJn0:QkIZGSAtgN+eJn0

    Score
    10/10
    • Babylon RAT

      Babylon RAT is remote access trojan written in C++.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks