General

  • Target

    d1d577dfbc682b820e500cce4ad48646_JaffaCakes118

  • Size

    1.4MB

  • Sample

    240907-nna1masbkq

  • MD5

    d1d577dfbc682b820e500cce4ad48646

  • SHA1

    7ba097832d552bb64d32a4bb62310328db17f49d

  • SHA256

    a1adf4ae36ba0af3acc9942191b5fe245adb7b1e85818eba2f665b561dfa6cde

  • SHA512

    13702616bcf361bc7478a07cbe340e3db185f091e2fd33eb43209ed0af57f48ebaf9a508ba1c69b239866e5e54e57418ce5aec15d42c9ec7f7df5d8c4d41534e

  • SSDEEP

    24576:H6Q7sNkj5Iig1aYpn1gqe+C9y5Ug0CXmVcKkcFC:H4NkVsaYF1gj+Clg0VBFC

Malware Config

Targets

    • Target

      d1d577dfbc682b820e500cce4ad48646_JaffaCakes118

    • Size

      1.4MB

    • MD5

      d1d577dfbc682b820e500cce4ad48646

    • SHA1

      7ba097832d552bb64d32a4bb62310328db17f49d

    • SHA256

      a1adf4ae36ba0af3acc9942191b5fe245adb7b1e85818eba2f665b561dfa6cde

    • SHA512

      13702616bcf361bc7478a07cbe340e3db185f091e2fd33eb43209ed0af57f48ebaf9a508ba1c69b239866e5e54e57418ce5aec15d42c9ec7f7df5d8c4d41534e

    • SSDEEP

      24576:H6Q7sNkj5Iig1aYpn1gqe+C9y5Ug0CXmVcKkcFC:H4NkVsaYF1gj+Clg0VBFC

    • Babylon RAT

      Babylon RAT is remote access trojan written in C++.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks