Analysis
-
max time kernel
593s -
max time network
517s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2024 14:52
Behavioral task
behavioral1
Sample
testrat.exe
Resource
win10v2004-20240508-en
windows10-2004-x64
6 signatures
600 seconds
General
-
Target
testrat.exe
-
Size
355KB
-
MD5
878372bf6c0f6e2ad6cec68369ec2016
-
SHA1
ef84acb11b67b1a250b79e73254e732f00f02814
-
SHA256
bfddac5c47e2cc4e3ddf8a42f28117739563811e2305550d8cfebbd881ae27ab
-
SHA512
c21a0f4e1a211a32d234812a267fa158da0f2d47d9e36c7096d9d3818e30a54e52b51ed081f466fdb17bda270625c3708ef4b0fdc5652b1b1af40aa01ec7aed2
-
SSDEEP
6144:ZL1ncfWwN0oc35jeRh8Xqfy/Ka1OHAH0tMrKCTEABG+Z9d3cQT/9nR4Ioy19X:ZLdcfxaeM6fy/KaVUtgKkTZ73coNRJ
Score
10/10
Malware Config
Signatures
-
Babylon RAT
Babylon RAT is remote access trojan written in C++.
-
resource yara_rule behavioral1/memory/1180-0-0x0000000000390000-0x0000000000459000-memory.dmp upx behavioral1/memory/1180-1-0x0000000000390000-0x0000000000459000-memory.dmp upx behavioral1/memory/1180-2-0x0000000000390000-0x0000000000459000-memory.dmp upx behavioral1/memory/1180-9-0x0000000000390000-0x0000000000459000-memory.dmp upx -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1180 testrat.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeShutdownPrivilege 1180 testrat.exe Token: SeDebugPrivilege 1180 testrat.exe Token: SeTcbPrivilege 1180 testrat.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1180 testrat.exe