General

  • Target

    Svchost.exe

  • Size

    355KB

  • Sample

    241107-zetxxsxpbz

  • MD5

    56a6dad3b5c2d51c3a8cd8604f51c31e

  • SHA1

    8b3bf3042278cc124a81d313245c307dd7171c78

  • SHA256

    d4672bb77e373845f4c9367ddcaea83c04e3bbf610e1cacd78a5f2fe1cef7122

  • SHA512

    3257f6558375cd81c1dfc26bccf99dd22646b4ad4619c43e404a10f9a7500dba36f65ab2d40690c8ec298bb2468f8657abaaa6e9bb350db65fa6b0c5709b0a6f

  • SSDEEP

    6144:nL1ncfWwN0oc35jeRh8Xqfy/Ka1OHAH0tMrKCTEABG+Z9d3cQT/9nR4Ioy19O6rV:nLdcfxaeM6fy/KaVUtgKkTZ73coNRJO6

Malware Config

Targets

    • Target

      Svchost.exe

    • Size

      355KB

    • MD5

      56a6dad3b5c2d51c3a8cd8604f51c31e

    • SHA1

      8b3bf3042278cc124a81d313245c307dd7171c78

    • SHA256

      d4672bb77e373845f4c9367ddcaea83c04e3bbf610e1cacd78a5f2fe1cef7122

    • SHA512

      3257f6558375cd81c1dfc26bccf99dd22646b4ad4619c43e404a10f9a7500dba36f65ab2d40690c8ec298bb2468f8657abaaa6e9bb350db65fa6b0c5709b0a6f

    • SSDEEP

      6144:nL1ncfWwN0oc35jeRh8Xqfy/Ka1OHAH0tMrKCTEABG+Z9d3cQT/9nR4Ioy19O6rV:nLdcfxaeM6fy/KaVUtgKkTZ73coNRJO6

    • Babylon RAT

      Babylon RAT is remote access trojan written in C++.

    • Babylonrat family

    • Executes dropped EXE

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks