General
-
Target
15b805ea0121bfaeadcd2e6f4cafce3199a91209f04b599bb333dca9010aeb55N.exe
-
Size
735KB
-
Sample
250120-hr9qgaxlhk
-
MD5
8b3abbb304f163345e23e9c6b1e70a90
-
SHA1
2f55f460322b4a687bc08e0f527e24b4a53e029c
-
SHA256
15b805ea0121bfaeadcd2e6f4cafce3199a91209f04b599bb333dca9010aeb55
-
SHA512
7894285b95a882b2bf1f66822e1a0e24d07b96dd0738238e87a12155e2613bf05baca081c4faa4e9597d99d4a6eca00fabfe7c7dc45b4ff193c4fbfad27b9f37
-
SSDEEP
12288:trsTMcgRdrEAzvHG4z2T6DSsyXUGz2FcFe0fySvZyESEGWKy:trsaRdrEAbm4zbryUGCMfySQ3y
Static task
static1
Behavioral task
behavioral1
Sample
15b805ea0121bfaeadcd2e6f4cafce3199a91209f04b599bb333dca9010aeb55N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
15b805ea0121bfaeadcd2e6f4cafce3199a91209f04b599bb333dca9010aeb55N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
babylonrat
cb4cb4.ddns.net
Targets
-
-
Target
15b805ea0121bfaeadcd2e6f4cafce3199a91209f04b599bb333dca9010aeb55N.exe
-
Size
735KB
-
MD5
8b3abbb304f163345e23e9c6b1e70a90
-
SHA1
2f55f460322b4a687bc08e0f527e24b4a53e029c
-
SHA256
15b805ea0121bfaeadcd2e6f4cafce3199a91209f04b599bb333dca9010aeb55
-
SHA512
7894285b95a882b2bf1f66822e1a0e24d07b96dd0738238e87a12155e2613bf05baca081c4faa4e9597d99d4a6eca00fabfe7c7dc45b4ff193c4fbfad27b9f37
-
SSDEEP
12288:trsTMcgRdrEAzvHG4z2T6DSsyXUGz2FcFe0fySvZyESEGWKy:trsaRdrEAbm4zbryUGCMfySQ3y
Score10/10-
Babylonrat family
-
Drops startup file
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1