MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ec1f605af73a6c8023ec3d65742fc5342a18ecbf28109c547205571845b791f6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Babadeda


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: ec1f605af73a6c8023ec3d65742fc5342a18ecbf28109c547205571845b791f6
SHA3-384 hash: 262211e2d95ed167f1a2c6361c9ecba228d0f311ad24b6dba3d19f2cc8354dfed2fdec6aed31ef42a541c9ad12b5dc05
SHA1 hash: 0c6280551a2685b65453322e290cc3aaf020b06a
MD5 hash: cb2d57649b7bba12e9589a2b422a8afc
humanhash: uranus-eleven-monkey-pasta
File name:vt_ec1f605af73a6c8023ec3d65742fc5342a18ecbf28109c547205571845b791f6
Download: download sample
Signature Babadeda
File size:89'088 bytes
First seen:2023-07-24 12:12:07 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 5877688b4859ffd051f6be3b8e0cd533 (119 x Babadeda, 2 x DCRat, 2 x RedLineStealer)
ssdeep 1536:D7fPGykbOqjoHm4pICdfkLtAfupcWX50MxFY+yIOlnToIf2x6OT:fq6+ouCpk2mpcWJ0r+QNTBf2j
Threatray 211 similar samples on MalwareBazaar
TLSH T1F7936C41F3E241F7E9F10A3100A6712FA73666249724E8DBC34C3D829953AD5AA7D3F9
TrID 36.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
19.5% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
12.4% (.EXE) Win64 Executable (generic) (10523/12/4)
7.7% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
5.9% (.EXE) Win16 NE executable (generic) (5038/12/1)
Reporter Anonymous
Tags:Babadeda exe RAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
313
Origin country :
PL PL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
vt_ec1f605af73a6c8023ec3d65742fc5342a18ecbf28109c547205571845b791f6
Verdict:
Suspicious activity
Analysis date:
2023-07-24 12:14:47 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Running batch commands
Creating a process with a hidden window
Launching a process
DNS request
Sending an HTTP GET request
Creating a file in the %AppData% directory
Sending a custom TCP request
Creating a window
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Babadeda
Detection:
malicious
Classification:
troj.evad
Score:
72 / 100
Signature
Detected unpacking (overwrites its own PE header)
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Uses known network protocols on non-standard ports
Yara detected Babadeda
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1278287 Sample: OGWrpHWILv.exe Startdate: 24/07/2023 Architecture: WINDOWS Score: 72 24 Multi AV Scanner detection for submitted file 2->24 26 Yara detected Babadeda 2->26 28 Machine Learning detection for sample 2->28 30 Uses known network protocols on non-standard ports 2->30 8 OGWrpHWILv.exe 8 2->8         started        process3 signatures4 32 Detected unpacking (overwrites its own PE header) 8->32 11 cmd.exe 1 8->11         started        process5 process6 13 powershell.exe 14 15 11->13         started        16 powershell.exe 7 11->16         started        18 conhost.exe 11->18         started        dnsIp7 22 vps.flyingcats.cloud 51.77.48.125, 49698, 8000 OVHFR France 13->22 20 notepad.exe 16->20         started        process8
Threat name:
Win32.Trojan.Casdet
Status:
Malicious
First seen:
2023-07-20 01:58:46 UTC
File Type:
PE (Exe)
Extracted files:
3
AV detection:
15 of 25 (60.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Checks computer location settings
Blocklisted process makes network request
Unpacked files
SH256 hash:
ec1f605af73a6c8023ec3d65742fc5342a18ecbf28109c547205571845b791f6
MD5 hash:
cb2d57649b7bba12e9589a2b422a8afc
SHA1 hash:
0c6280551a2685b65453322e290cc3aaf020b06a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments