General

  • Target

    niggas.exe

  • Size

    355KB

  • Sample

    240828-bbz3rsyfmg

  • MD5

    427d3738eeb619ef2c1ef2510baac15c

  • SHA1

    1b53ba2b409632de07ba41bd9a1aa62330ab4568

  • SHA256

    92bd69c3130ecb7a5113f9a5c2dc8463e16e21e6db3414cf0a8342c4dab702e1

  • SHA512

    fbe735a7107d4eb6272d98da93ad6db9ab172eec5532217c2289bf4bc676ffa287924d63c0d8f8b0adba76be92a6f2f7880bee0ab5bd85c7ac14df52b1b3645c

  • SSDEEP

    6144:iL1ncfWwN0oc35jeRh8Xqfy/Ka1OHAH0tMrKCTEABG+Z9d3cQT/9nR4Ioy19erV:iLdcfxaeM6fy/KaVUtgKkTZ73coNRJe

Malware Config

Targets

    • Target

      niggas.exe

    • Size

      355KB

    • MD5

      427d3738eeb619ef2c1ef2510baac15c

    • SHA1

      1b53ba2b409632de07ba41bd9a1aa62330ab4568

    • SHA256

      92bd69c3130ecb7a5113f9a5c2dc8463e16e21e6db3414cf0a8342c4dab702e1

    • SHA512

      fbe735a7107d4eb6272d98da93ad6db9ab172eec5532217c2289bf4bc676ffa287924d63c0d8f8b0adba76be92a6f2f7880bee0ab5bd85c7ac14df52b1b3645c

    • SSDEEP

      6144:iL1ncfWwN0oc35jeRh8Xqfy/Ka1OHAH0tMrKCTEABG+Z9d3cQT/9nR4Ioy19erV:iLdcfxaeM6fy/KaVUtgKkTZ73coNRJe

    • Babylon RAT

      Babylon RAT is remote access trojan written in C++.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks