MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e9a8601a49cc030d4fedc70be3e7f3aeb47af4660ccba49eb3f8510e5eac4507. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BlackShades


Vendor detections: 16


Intelligence 16 IOCs YARA 16 File information Comments

SHA256 hash: e9a8601a49cc030d4fedc70be3e7f3aeb47af4660ccba49eb3f8510e5eac4507
SHA3-384 hash: 697e07bf03b60c33f4361dd04e8e662f7cf90518967c6763617500b461366c064eaeca03f36c740a3d77e2538ebe6b13
SHA1 hash: 04ed3fb224d31898561d9fb39845446cb6e978f1
MD5 hash: 39aca27a8cb300e93ec342d38ca8d3ee
humanhash: pizza-earth-october-one
File name:duxfun.in.net.exe
Download: download sample
Signature BlackShades
File size:734'720 bytes
First seen:2026-05-12 09:50:23 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 18aee7cc80e48017bb06b13550617d1d (5 x BlackShades, 1 x BabylonRAT)
ssdeep 12288:GLdcfxaeM6fy/KaVUtgKkTZ73coU5C/y8:ukIZGSAtgN+y
Threatray 46 similar samples on MalwareBazaar
TLSH T126F4012035C4F41BD95EAAB18F09F4B854653C595E8A4BA3B6CC77EF30BEDA04878394
TrID 63.4% (.EXE) UPX compressed Win32 Executable (27066/9/6)
11.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
10.5% (.EXE) Win32 Executable (generic) (4504/4/1)
4.7% (.EXE) OS/2 Executable (generic) (2029/13)
4.6% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
dhash icon 31f09c969696f871 (14 x NanoCore, 5 x AsyncRAT, 4 x LimeRAT)
Reporter Anonymous
Tags:BabylonRAT exe UPX
File size (compressed) :734'720 bytes
File size (de-compressed) :1'120'768 bytes
Format:win32/pe
Unpacked file: decf4cea29ac723a049e3a698ceb3a5ef3770620bb194fcbf3785b6b11fd4b66

Intelligence


File Origin
# of uploads :
1
# of downloads :
126
Origin country :
NZ NZ
Vendor Threat Intelligence
Malware configuration found for:
BabylonRAT PEPacker
Details
BabylonRAT
c2 socket addresses, a mutex, an interval, network encryption keys, and, if configured, installation parameters
PEPacker
a UPX version number and an unpacked binary
Malware family:
babylon
ID:
1
File name:
duxfun.in.net.exe
Verdict:
Malicious activity
Analysis date:
2026-05-12 09:44:09 UTC
Tags:
babylon rat upx

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
97.4%
Tags:
downloader dropper keylog
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug crypto fingerprint keylogger masquerade microsoft_visual_cc packed packed reconnaissance upx
Verdict:
Malicious
File Type:
exe x32
First seen:
2026-05-12T06:55:00Z UTC
Last seen:
2026-05-13T02:16:00Z UTC
Hits:
~10
Detections:
Trojan-Spy.Win32.Xegumumune.sbc Trojan-Spy.Win32.Stealer.sb Trojan-Spy.Win32.Larby.sb Trojan-Spy.Win32.KeyLogger.sb HEUR:Trojan.Win32.Generic HEUR:Trojan-Spy.Win32.Larby.gen
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Win 32 Exe x86
Threat name:
Win32.Backdoor.Dodiw
Status:
Malicious
First seen:
2026-05-12 09:44:14 UTC
File Type:
PE (Exe)
Extracted files:
27
AV detection:
22 of 24 (91.67%)
Threat level:
  5/5
Result
Malware family:
babylonrat
Score:
  10/10
Tags:
family:babylonrat discovery trojan upx
Behaviour
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
System Location Discovery: System Language Discovery
UPX packed file
Babylon RAT payload
Family: Babylon RAT
Malware Config
C2 Extraction:
duxfun.in.net
Unpacked files
SH256 hash:
e9a8601a49cc030d4fedc70be3e7f3aeb47af4660ccba49eb3f8510e5eac4507
MD5 hash:
39aca27a8cb300e93ec342d38ca8d3ee
SHA1 hash:
04ed3fb224d31898561d9fb39845446cb6e978f1
SH256 hash:
641518539a1318ca172d7727b3a084507dd2400d56d197555879408e6a51a567
MD5 hash:
cdc1829d8994bcb98bd4d76ec7b23440
SHA1 hash:
13eac15b1bc1832b03b1cf5f8b5061e071692ea0
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BlackShades_4
Author:Jean-Philippe Teissier / @Jipe_
Description:BlackShades
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:MALWARE_Win_BabylonRAT
Author:ditekSHen
Description:Detects BabylonRAT / CollectorStealer / ParadoxRAT
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:upx_largefile
Author:k3nr9
Rule name:VECT_Ransomware
Author:Mustafa Bakhit
Description:Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments.
Rule name:win_babylon_rat_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.babylon_rat.
Rule name:win_blackshades_w0
Author:Jean-Philippe Teissier / @Jipe_

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BlackShades

Executable exe e9a8601a49cc030d4fedc70be3e7f3aeb47af4660ccba49eb3f8510e5eac4507

(this sample)

Comments