Overview
overview
10Static
static
10Babylon 1....AT.exe
windows10-1703-x64
10Babylon 1....ew.dll
windows10-1703-x64
1Babylon 1....GI.dll
windows10-1703-x64
1Babylon 1....D1.dll
windows10-1703-x64
1Babylon 1....10.dll
windows10-1703-x64
1Babylon 1....DX.dll
windows10-1703-x64
1Babylon 1....me.dll
windows10-1703-x64
1Babylon 1....er.exe
windows10-1703-x64
10Analysis
-
max time kernel
1794s -
max time network
1608s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
29-06-2024 19:36
Behavioral task
behavioral1
Sample
Babylon 1.6.0.0/Babylon RAT.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Babylon 1.6.0.0/ObjectListView.dll
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
Babylon 1.6.0.0/SharpDX.DXGI.dll
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
Babylon 1.6.0.0/SharpDX.Direct2D1.dll
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
Babylon 1.6.0.0/SharpDX.Direct3D10.dll
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
Babylon 1.6.0.0/SharpDX.dll
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
Babylon 1.6.0.0/Theme.dll
Resource
win10-20240611-en
Behavioral task
behavioral8
Sample
Babylon 1.6.0.0/server.exe
Resource
win10-20240404-en
General
-
Target
Babylon 1.6.0.0/server.exe
-
Size
355KB
-
MD5
b3959d510f716ea5e7eac3dfecb960b2
-
SHA1
376752bd404952b7d960b0c35051c9d1f78bd1e6
-
SHA256
40bb9963dfa7bef8169b8746bcb894cd53586c3d2f4316eb6cebb242f49be1ef
-
SHA512
d7678287f5850397ce05a2711da1cd682ecb5c9c39c18d1fae01f0aa6cf786d1f110887ab2bf27cd93316c416a09f87161a9a32b6f149d572ee5ccccd24aaa8d
-
SSDEEP
6144:+L1ncfWwN0oc35jeRh8Xqfy/Ka1OHAH0tMrKCTEABG+Z9d3cQT/9nR4Ioy19:+LdcfxaeM6fy/KaVUtgKkTZ73coNRJ
Malware Config
Signatures
-
Babylon RAT
Babylon RAT is remote access trojan written in C++.
-
resource yara_rule behavioral8/memory/2192-0-0x0000000000210000-0x00000000002D9000-memory.dmp upx behavioral8/memory/2192-1-0x0000000000210000-0x00000000002D9000-memory.dmp upx behavioral8/memory/2192-3-0x0000000000210000-0x00000000002D9000-memory.dmp upx behavioral8/memory/2192-4-0x0000000000210000-0x00000000002D9000-memory.dmp upx -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2192 server.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeShutdownPrivilege 2192 server.exe Token: SeDebugPrivilege 2192 server.exe Token: SeTcbPrivilege 2192 server.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2192 server.exe