General

  • Target

    UNIVERSALCHETA.exe

  • Size

    355KB

  • Sample

    250126-q3mdbatrbm

  • MD5

    10ed02c031944ddb3f6bfce0ad48c96a

  • SHA1

    0b41dc80543290f77076836e5dc62f1ff072b3fe

  • SHA256

    1ddde818bbcce3fe9e6f70ca9c7b44aac6c5687db4202e93fa64245396001677

  • SHA512

    a1545160a810043cbf90db9187800d6538e5137a64a3fa4acd5fd79e9bab09febdadc444f55229cfcfa601afa3834302b34f03851e1d46773fb09e7fdbe8a554

  • SSDEEP

    6144:nL1ncfWwN0oc35jeRh8Xqfy/Ka1OHAH0tMrKCTEABG+Z9d3cQT/9nR4Ioy19I:nLdcfxaeM6fy/KaVUtgKkTZ73coNRJI

Malware Config

Targets

    • Target

      UNIVERSALCHETA.exe

    • Size

      355KB

    • MD5

      10ed02c031944ddb3f6bfce0ad48c96a

    • SHA1

      0b41dc80543290f77076836e5dc62f1ff072b3fe

    • SHA256

      1ddde818bbcce3fe9e6f70ca9c7b44aac6c5687db4202e93fa64245396001677

    • SHA512

      a1545160a810043cbf90db9187800d6538e5137a64a3fa4acd5fd79e9bab09febdadc444f55229cfcfa601afa3834302b34f03851e1d46773fb09e7fdbe8a554

    • SSDEEP

      6144:nL1ncfWwN0oc35jeRh8Xqfy/Ka1OHAH0tMrKCTEABG+Z9d3cQT/9nR4Ioy19I:nLdcfxaeM6fy/KaVUtgKkTZ73coNRJI

    • Babylon RAT

      Babylon RAT is remote access trojan written in C++.

    • Babylonrat family

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks