General

  • Target

    BootstrapperV1.14.exe

  • Size

    355KB

  • Sample

    240807-ft9r5svgrc

  • MD5

    067c6c628c0c7dbb028fab54c5844d9c

  • SHA1

    7cab5b0d5e6e9dfc292d0a5389dcf9175f1f309e

  • SHA256

    ad207ea2585a308213e1af21a1f376661e18289cf545415ca2fd0d4f56e304a4

  • SHA512

    678ddb6b3d8fafd45596d2d85428c91da0253bab6431f4cddfbf125bbd039f45ff2248c021504671ce8de57fd6b3866d301dbd3254ece0d1ddddc0739ee75fa1

  • SSDEEP

    6144:7L1ncfWwN0oc35jeRh8Xqfy/Ka1OHAH0tMrKCTEABG+Z9d3cQT/9nR4Ioy19:7LdcfxaeM6fy/KaVUtgKkTZ73coNRJ

Malware Config

Targets

    • Target

      BootstrapperV1.14.exe

    • Size

      355KB

    • MD5

      067c6c628c0c7dbb028fab54c5844d9c

    • SHA1

      7cab5b0d5e6e9dfc292d0a5389dcf9175f1f309e

    • SHA256

      ad207ea2585a308213e1af21a1f376661e18289cf545415ca2fd0d4f56e304a4

    • SHA512

      678ddb6b3d8fafd45596d2d85428c91da0253bab6431f4cddfbf125bbd039f45ff2248c021504671ce8de57fd6b3866d301dbd3254ece0d1ddddc0739ee75fa1

    • SSDEEP

      6144:7L1ncfWwN0oc35jeRh8Xqfy/Ka1OHAH0tMrKCTEABG+Z9d3cQT/9nR4Ioy19:7LdcfxaeM6fy/KaVUtgKkTZ73coNRJ

    • Babylon RAT

      Babylon RAT is remote access trojan written in C++.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks