General
-
Target
23b101ef7ee302d8ef4fb86266343f54a7d1250080a68b3aad7f7fd1bdb78358
-
Size
2.3MB
-
Sample
241113-y869nssjgk
-
MD5
86b78d0385dcd977ec0bb2d65a11611d
-
SHA1
d756ae4d08c2bff65455a0a4699436594cb57396
-
SHA256
23b101ef7ee302d8ef4fb86266343f54a7d1250080a68b3aad7f7fd1bdb78358
-
SHA512
7ae019ab651ec23b3b98bb86af992e2cc44bb5dbec3d8f29278d2fb994fcca679842b23e985b4361af9ebe47771dc989a8aac2a4c2392acf4cfed4e1c36f83c9
-
SSDEEP
24576:x1r43sfARB7U4kieI1SqjEDKcSrJIvJiu/AxWt+:Pr43o67TrXIqjbcS6vJT6Wt+
Static task
static1
Behavioral task
behavioral1
Sample
23b101ef7ee302d8ef4fb86266343f54a7d1250080a68b3aad7f7fd1bdb78358.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
23b101ef7ee302d8ef4fb86266343f54a7d1250080a68b3aad7f7fd1bdb78358.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
babylonrat
doddyfire.dyndns.org
doddyfire.linkpc.net
Targets
-
-
Target
23b101ef7ee302d8ef4fb86266343f54a7d1250080a68b3aad7f7fd1bdb78358
-
Size
2.3MB
-
MD5
86b78d0385dcd977ec0bb2d65a11611d
-
SHA1
d756ae4d08c2bff65455a0a4699436594cb57396
-
SHA256
23b101ef7ee302d8ef4fb86266343f54a7d1250080a68b3aad7f7fd1bdb78358
-
SHA512
7ae019ab651ec23b3b98bb86af992e2cc44bb5dbec3d8f29278d2fb994fcca679842b23e985b4361af9ebe47771dc989a8aac2a4c2392acf4cfed4e1c36f83c9
-
SSDEEP
24576:x1r43sfARB7U4kieI1SqjEDKcSrJIvJiu/AxWt+:Pr43o67TrXIqjbcS6vJT6Wt+
Score10/10-
Babylonrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1