General

  • Target

    39884fc02ed9a51ffcc9b298916be79307f15f1518b6ae2021dd07af0aeecb82.exe

  • Size

    3.3MB

  • Sample

    240715-a4l6yazflk

  • MD5

    7cdff219ccaaa4c4d67448e9e812f2de

  • SHA1

    a063103f177df84c90f0054d0f2adcae6f1885af

  • SHA256

    39884fc02ed9a51ffcc9b298916be79307f15f1518b6ae2021dd07af0aeecb82

  • SHA512

    5986b98ac4ff98da5188b8d5ee53400a4a3bd7dfe3de70471b090c3c3d751f550f7ebd3757554e5976b069c1da1cc1cb69808504ac97987ae42e5152f72408e5

  • SSDEEP

    49152:/5dVwPaFHTTgkAAn2IQ39y9rRF8v72yEh72yEE72yE72y5:RdW4lQw5RF8T

Score
10/10

Malware Config

Targets

    • Target

      39884fc02ed9a51ffcc9b298916be79307f15f1518b6ae2021dd07af0aeecb82.exe

    • Size

      3.3MB

    • MD5

      7cdff219ccaaa4c4d67448e9e812f2de

    • SHA1

      a063103f177df84c90f0054d0f2adcae6f1885af

    • SHA256

      39884fc02ed9a51ffcc9b298916be79307f15f1518b6ae2021dd07af0aeecb82

    • SHA512

      5986b98ac4ff98da5188b8d5ee53400a4a3bd7dfe3de70471b090c3c3d751f550f7ebd3757554e5976b069c1da1cc1cb69808504ac97987ae42e5152f72408e5

    • SSDEEP

      49152:/5dVwPaFHTTgkAAn2IQ39y9rRF8v72yEh72yEE72yE72y5:RdW4lQw5RF8T

    Score
    10/10
    • Babylon RAT

      Babylon RAT is remote access trojan written in C++.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks