General

  • Target

    st4.exe

  • Size

    355KB

  • Sample

    250314-pl66qatnz3

  • MD5

    aa08724b19677bb60cf8c8be270d9c01

  • SHA1

    cc1e389fc0c0fd9f69307857aa21e98931f495b3

  • SHA256

    c6177ccd77bb789f42030e4d8921eafbb2fe409786402ed385a86f0be7a7dd03

  • SHA512

    ec9d9058c9a11ea820e915a057a423a5dba931e19917ca344a89c5a978791584f0299d5345bbea32bcf3123859c41f3208002573f015863006884bcb0cb8f3d5

  • SSDEEP

    6144:nL1ncfWwN0oc35jeRh8Xqfy/Ka1OHAH0tMrKCTEABG+Z9d3cQT/9nR4Ioy19R:nLdcfxaeM6fy/KaVUtgKkTZ73coNRJR

Malware Config

Targets

    • Target

      st4.exe

    • Size

      355KB

    • MD5

      aa08724b19677bb60cf8c8be270d9c01

    • SHA1

      cc1e389fc0c0fd9f69307857aa21e98931f495b3

    • SHA256

      c6177ccd77bb789f42030e4d8921eafbb2fe409786402ed385a86f0be7a7dd03

    • SHA512

      ec9d9058c9a11ea820e915a057a423a5dba931e19917ca344a89c5a978791584f0299d5345bbea32bcf3123859c41f3208002573f015863006884bcb0cb8f3d5

    • SSDEEP

      6144:nL1ncfWwN0oc35jeRh8Xqfy/Ka1OHAH0tMrKCTEABG+Z9d3cQT/9nR4Ioy19R:nLdcfxaeM6fy/KaVUtgKkTZ73coNRJR

    • Babylon RAT

      Babylon RAT is remote access trojan written in C++.

    • Babylonrat family

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks