General

  • Target

    Test.exe

  • Size

    355KB

  • Sample

    250423-vpcn6sxq12

  • MD5

    1e05be79633849a73d4daaba1e4c08c1

  • SHA1

    73eb87aa50de43cbb86e25d8565f3aa727fc1718

  • SHA256

    3424b126a66f15984149eb747f0dce0c0fa2ce55c48412872b882a8431fb0175

  • SHA512

    a01c345c6ef7cece4cdd612d8457cc06780003311f25dfa43b6cbf830b43d03515f261da7c4d099489d8356cfe6c9524de8be29202fa0c9b64c2895895df37c1

  • SSDEEP

    6144:pL1ncfWwN0oc35jeRh8Xqfy/Ka1OHAH0tMrKCTEABG+Z9d3cQT/9nR4Ioy19:pLdcfxaeM6fy/KaVUtgKkTZ73coNRJ

Malware Config

Targets

    • Target

      Test.exe

    • Size

      355KB

    • MD5

      1e05be79633849a73d4daaba1e4c08c1

    • SHA1

      73eb87aa50de43cbb86e25d8565f3aa727fc1718

    • SHA256

      3424b126a66f15984149eb747f0dce0c0fa2ce55c48412872b882a8431fb0175

    • SHA512

      a01c345c6ef7cece4cdd612d8457cc06780003311f25dfa43b6cbf830b43d03515f261da7c4d099489d8356cfe6c9524de8be29202fa0c9b64c2895895df37c1

    • SSDEEP

      6144:pL1ncfWwN0oc35jeRh8Xqfy/Ka1OHAH0tMrKCTEABG+Z9d3cQT/9nR4Ioy19:pLdcfxaeM6fy/KaVUtgKkTZ73coNRJ

    • Babylon RAT

      Babylon RAT is remote access trojan written in C++.

    • Babylonrat family

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v16

Tasks