General

  • Target

    2024-06-26_66383700fdfaca06f74a87cb628bb89f_poet-rat_snatch

  • Size

    4.9MB

  • Sample

    240626-nzywtstcna

  • MD5

    66383700fdfaca06f74a87cb628bb89f

  • SHA1

    f157bd262904db73a7da388470872386433f094f

  • SHA256

    0217f0ab778acfba323a9b444c8661618fc23f23906f16fe46564a86e4b86836

  • SHA512

    30894da96435b2fdb8136b2c071d42bae3cca3107d21b176a9529d0af145ee9589a43fda6dde4fd95ed7732ea6b39e8cfac2fbf941e70d95fec1072864c576cf

  • SSDEEP

    49152:+ur1PwvIyeo+j+E5p9vTiOHWdC9hHbxCM5EmsMpQMLxA7i:FVo+jXJzWdC9lXEmGMN3

Malware Config

Extracted

Family

babylonrat

C2

147.185.221.20

Targets

    • Target

      2024-06-26_66383700fdfaca06f74a87cb628bb89f_poet-rat_snatch

    • Size

      4.9MB

    • MD5

      66383700fdfaca06f74a87cb628bb89f

    • SHA1

      f157bd262904db73a7da388470872386433f094f

    • SHA256

      0217f0ab778acfba323a9b444c8661618fc23f23906f16fe46564a86e4b86836

    • SHA512

      30894da96435b2fdb8136b2c071d42bae3cca3107d21b176a9529d0af145ee9589a43fda6dde4fd95ed7732ea6b39e8cfac2fbf941e70d95fec1072864c576cf

    • SSDEEP

      49152:+ur1PwvIyeo+j+E5p9vTiOHWdC9hHbxCM5EmsMpQMLxA7i:FVo+jXJzWdC9lXEmGMN3

    • Babylon RAT

      Babylon RAT is remote access trojan written in C++.

    • Detects executables containing SQL queries to confidential data stores. Observed in infostealers

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks