General

  • Target

    06cee330873dcfa28588c5cedcb0caf23ac9a5a1e5b80ba4d6b9814228a77b77N

  • Size

    1.3MB

  • Sample

    241026-lb42tszrgz

  • MD5

    b04423f83519155fc950f822e03689c0

  • SHA1

    3a32f770c2d28954c10a2facba5ca2f1ba5c4cfc

  • SHA256

    06cee330873dcfa28588c5cedcb0caf23ac9a5a1e5b80ba4d6b9814228a77b77

  • SHA512

    60445ebd75651d2f3914c8352de0195a03ea0c31dab9bb140d441623804c75eadbe5ad4b8ffaf5c8f30cdcf8d2638ca3fafae932b77bd64c03822b16febc8fd7

  • SSDEEP

    24576:PAHnh+eWsN3skA4RV1Hom2KXMmHaOg6ca9Jxys5csIBtnr0R5:yh+ZkldoPK8YaOfcixysesIDa

Malware Config

Targets

    • Target

      06cee330873dcfa28588c5cedcb0caf23ac9a5a1e5b80ba4d6b9814228a77b77N

    • Size

      1.3MB

    • MD5

      b04423f83519155fc950f822e03689c0

    • SHA1

      3a32f770c2d28954c10a2facba5ca2f1ba5c4cfc

    • SHA256

      06cee330873dcfa28588c5cedcb0caf23ac9a5a1e5b80ba4d6b9814228a77b77

    • SHA512

      60445ebd75651d2f3914c8352de0195a03ea0c31dab9bb140d441623804c75eadbe5ad4b8ffaf5c8f30cdcf8d2638ca3fafae932b77bd64c03822b16febc8fd7

    • SSDEEP

      24576:PAHnh+eWsN3skA4RV1Hom2KXMmHaOg6ca9Jxys5csIBtnr0R5:yh+ZkldoPK8YaOfcixysesIDa

    • Babylon RAT

      Babylon RAT is remote access trojan written in C++.

    • Babylonrat family

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks