General

  • Target

    2024-12-28_0920f55f8f80d22820f048b76781214b_cobalt-strike_ryuk

  • Size

    14.7MB

  • Sample

    241228-vxkdzszlgz

  • MD5

    0920f55f8f80d22820f048b76781214b

  • SHA1

    41f65a940ef7aa8e9316d6d8f805effaace2196e

  • SHA256

    462f6e2a08a6250591da8d414c22b250bc6033f996a924c7c08a03ba929d6f2b

  • SHA512

    d47aa08565f2d38f46d39bc4a7861f587ae943ebe86b09b6c0b49337a67967f8a995680152df115adf2a309279d9e7ad588083e91a103ccf912c5cb72655d52f

  • SSDEEP

    393216:LijiMENzS8H/VIEJjI1PbV/jIJ92/juXnkIwvyx:LiWMSzS8H/egs15r+jwv

Malware Config

Extracted

Family

babylonrat

C2

91.227.18.174

Targets

    • Target

      2024-12-28_0920f55f8f80d22820f048b76781214b_cobalt-strike_ryuk

    • Size

      14.7MB

    • MD5

      0920f55f8f80d22820f048b76781214b

    • SHA1

      41f65a940ef7aa8e9316d6d8f805effaace2196e

    • SHA256

      462f6e2a08a6250591da8d414c22b250bc6033f996a924c7c08a03ba929d6f2b

    • SHA512

      d47aa08565f2d38f46d39bc4a7861f587ae943ebe86b09b6c0b49337a67967f8a995680152df115adf2a309279d9e7ad588083e91a103ccf912c5cb72655d52f

    • SSDEEP

      393216:LijiMENzS8H/VIEJjI1PbV/jIJ92/juXnkIwvyx:LiWMSzS8H/egs15r+jwv

    • Babylon RAT

      Babylon RAT is remote access trojan written in C++.

    • Babylonrat family

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks