General

  • Target

    updater.exe

  • Size

    355KB

  • Sample

    250412-z3kzxs1ns2

  • MD5

    d7ddee47c149113ab81ab9f7ac388f4d

  • SHA1

    fb0601093aeccdf4fdf7167c9a3561dbd5ccafd4

  • SHA256

    dbed1c3cb5de01fdd8c24374e26d8c7630c67e47c875669195ab86656964e836

  • SHA512

    ccf003b6c1c051dfa3c6cad334bda35f66725c1f98eb0b2945e06d20364cf9e3094705f06f935bcd084c19bb7558aa9aadebfa83a88c4aface646ac13a076ffc

  • SSDEEP

    6144:LL1ncfWwN0oc35jeRh8Xqfy/Ka1OHAH0tMrKCTEABG+Z9d3cQT/9nR4Ioy19m:LLdcfxaeM6fy/KaVUtgKkTZ73coNRJm

Malware Config

Extracted

Family

babylonrat

C2

66.113.31.17

Targets

    • Target

      updater.exe

    • Size

      355KB

    • MD5

      d7ddee47c149113ab81ab9f7ac388f4d

    • SHA1

      fb0601093aeccdf4fdf7167c9a3561dbd5ccafd4

    • SHA256

      dbed1c3cb5de01fdd8c24374e26d8c7630c67e47c875669195ab86656964e836

    • SHA512

      ccf003b6c1c051dfa3c6cad334bda35f66725c1f98eb0b2945e06d20364cf9e3094705f06f935bcd084c19bb7558aa9aadebfa83a88c4aface646ac13a076ffc

    • SSDEEP

      6144:LL1ncfWwN0oc35jeRh8Xqfy/Ka1OHAH0tMrKCTEABG+Z9d3cQT/9nR4Ioy19m:LLdcfxaeM6fy/KaVUtgKkTZ73coNRJm

    • Babylon RAT

      Babylon RAT is remote access trojan written in C++.

    • Babylonrat family

    • Executes dropped EXE

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v16

Tasks