General
-
Target
0b3eb2c564e87b1aa8c853a6af7a08836ea402c7776f44650849abdc1d4c5d44.exe
-
Size
951KB
-
Sample
250201-ngv28azlbt
-
MD5
aa82ab6c120ad91f064822494fe62efb
-
SHA1
eb10220cfcad3f8e92d5bcbda0d49cf1866df9a0
-
SHA256
0b3eb2c564e87b1aa8c853a6af7a08836ea402c7776f44650849abdc1d4c5d44
-
SHA512
3edfd8f420f3a29477a006000ce6c809814f496edc30ae86278b6cda103641ac69fec086698d4171be8f3975cb373ef5502ab34266fd8d1338b51ff2fa020920
-
SSDEEP
24576:AN+cu49fdt9rdqyPWLzAh0ldWjWCV6JApBpgK5Fz:i+cuWt9RZPgK0ldWjWCPppFz
Static task
static1
Behavioral task
behavioral1
Sample
0b3eb2c564e87b1aa8c853a6af7a08836ea402c7776f44650849abdc1d4c5d44.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
0b3eb2c564e87b1aa8c853a6af7a08836ea402c7776f44650849abdc1d4c5d44.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
babylonrat
serialordersservice.ddns.net
Targets
-
-
Target
0b3eb2c564e87b1aa8c853a6af7a08836ea402c7776f44650849abdc1d4c5d44.exe
-
Size
951KB
-
MD5
aa82ab6c120ad91f064822494fe62efb
-
SHA1
eb10220cfcad3f8e92d5bcbda0d49cf1866df9a0
-
SHA256
0b3eb2c564e87b1aa8c853a6af7a08836ea402c7776f44650849abdc1d4c5d44
-
SHA512
3edfd8f420f3a29477a006000ce6c809814f496edc30ae86278b6cda103641ac69fec086698d4171be8f3975cb373ef5502ab34266fd8d1338b51ff2fa020920
-
SSDEEP
24576:AN+cu49fdt9rdqyPWLzAh0ldWjWCV6JApBpgK5Fz:i+cuWt9RZPgK0ldWjWCPppFz
Score10/10-
Babylonrat family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-