General

  • Target

    8c01b6f50eb7bd6b06ccd086ac2fa820144091f6bcfbce523b1a4de91353316eN

  • Size

    1.3MB

  • Sample

    241023-hapc7swblh

  • MD5

    69da51a543298e254ff1471a788e7080

  • SHA1

    482b944836be49fdd810c235098b9eaf26e66eb8

  • SHA256

    8c01b6f50eb7bd6b06ccd086ac2fa820144091f6bcfbce523b1a4de91353316e

  • SHA512

    4fdceb60429847a54fb711d38c6ff1a0a6641829253fb8c8924e2283fbc3caa11e4f46201f3e2e94dd37b9294554ff7b174fc9ea3b1121da392c9a0abcd8765d

  • SSDEEP

    24576:cAHnh+eWsN3skA4RV1Hom2KXMmHatP7L6MNuBTZ4xtwziVmBhM5:7h+ZkldoPK8YatPvnNMVRziVJ

Malware Config

Targets

    • Target

      8c01b6f50eb7bd6b06ccd086ac2fa820144091f6bcfbce523b1a4de91353316eN

    • Size

      1.3MB

    • MD5

      69da51a543298e254ff1471a788e7080

    • SHA1

      482b944836be49fdd810c235098b9eaf26e66eb8

    • SHA256

      8c01b6f50eb7bd6b06ccd086ac2fa820144091f6bcfbce523b1a4de91353316e

    • SHA512

      4fdceb60429847a54fb711d38c6ff1a0a6641829253fb8c8924e2283fbc3caa11e4f46201f3e2e94dd37b9294554ff7b174fc9ea3b1121da392c9a0abcd8765d

    • SSDEEP

      24576:cAHnh+eWsN3skA4RV1Hom2KXMmHatP7L6MNuBTZ4xtwziVmBhM5:7h+ZkldoPK8YatPvnNMVRziVJ

    • Babylon RAT

      Babylon RAT is remote access trojan written in C++.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks