General

  • Target

    fa7ce16aab3ede14a4274600b3787bc66047001264da0cdeb965f231a1fd826f

  • Size

    733KB

  • MD5

    73a2ea546c656ceaa289f9221b6a1f59

  • SHA1

    75ae715e21b6c2d3fb229f566a54518ac044d58b

  • SHA256

    fa7ce16aab3ede14a4274600b3787bc66047001264da0cdeb965f231a1fd826f

  • SHA512

    260ea61d495af5911080f268402c9be539cb8623418a71602db71e7e9933a80002c5ccaa4c29c78a60b22f0a2e773df46e0bd6f0d9f26e0e050542873e77e3a6

  • SSDEEP

    12288:8qzcpVgUXzL0TTUKZHTNloEkOpnKgofuIwV6eAj0wZxxXMcEe/3paPcg8X:8qzcpKIL0TvZzNlNky0wVW0wZxxVg8X

Score
10/10

Malware Config

Extracted

Family

babylonrat

C2

147.185.221.20

Signatures

  • Babylonrat family
  • Detects executables containing SQL queries to confidential data stores. Observed in infostealers 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • fa7ce16aab3ede14a4274600b3787bc66047001264da0cdeb965f231a1fd826f
    .exe windows:5 windows x86 arch:x86

    2cbe6db2ec1d8a931b50336af1a7dc15


    Headers

    Imports

    Sections