Threat Database Trojans Trojan.Babar.TC

Trojan.Babar.TC

By CagedTech in Trojans

Analysis Report

General information

Family Name: Trojan.Babar.TC
Packers: UPX
Signature status: No Signature

Known Samples

MD5: 85b25ee6f24a061c98917ad8ee1d9643
SHA1: 4d6ec038e57bfc749cb48c700f0682863848d576
File Size: 840.64 KB, 840641 bytes
MD5: 15a54a637b99469e8f720326fab539bc
SHA1: 736568abded83fa153245c35c3aced141d1136bb
File Size: 1.22 MB, 1216587 bytes
MD5: 13e741aff846cdd0d0f4913ae13fb579
SHA1: 1935f14e93a49d9ae682be774edd4166a5ce2013
File Size: 1.58 MB, 1580127 bytes
MD5: f927a804b3d9b5213b9158a25d34fe46
SHA1: 247ef34fa48fe548298d22fb12321e47493cf1b7
File Size: 5.87 MB, 5871383 bytes
MD5: 7c8e7d668968cf463404ce110792af6f
SHA1: fc8f97216308a5ca6ea75b970b073dd195f49d75
SHA256: 984DF9582028C64106A53E154937DCA00FD040231963E2AE8CB06C8678AA2879
File Size: 3.00 MB, 3000332 bytes
Show More
MD5: 7963bfc4fb681552ca39d16b723702c7
SHA1: 33f15e7258467d02ee0d123e318091261f6e8177
SHA256: 48C6F7E527D215255F462C54EE138C0B4AA286C42BCE285F1857DF140CCDCA5D
File Size: 5.27 MB, 5271159 bytes
MD5: ed81016dc11f82429d94e3b44d0c6227
SHA1: cd9c33bd565794cf7389164513ddd293e8c30612
SHA256: E0A98FE28816FFED4A28AC293FBC00FADF1D6FC73CAD99C40A586895F3CA6AA8
File Size: 195.53 KB, 195531 bytes
MD5: 22ee79012d4a0c265d85e45ab36a86d1
SHA1: 8487c01907861f1e3423168e33132cf1415fecc6
SHA256: 997C8E8AFB30F5EF8FEF1B7ACCFC199DBB5A7BECAA91C4AF5E31B2C14C511DCF
File Size: 3.36 MB, 3359009 bytes
MD5: ccae0ee546ba1adc95b9d0bc8f881d4e
SHA1: 2d0c84c42d7680dd684c87778d9c9da822a7d65d
SHA256: F5DD1FF6134CBFCA9CD0DDD644B8CDE85055273456BE0872CDB2F8721B21C5DC
File Size: 5.13 MB, 5129525 bytes
MD5: d4dd81bc24fe8bb1d22d03333bb5d7d4
SHA1: 6c9985c4234fb15b82e969d1e71989720b0d2c62
SHA256: 9CBD3AB6763354F0F2DF1670B2CAE31FA63D1F278452B7E8E487F61425895E52
File Size: 1.98 MB, 1981341 bytes
MD5: 06f44c6e01f4a11cf81876ff913184ba
SHA1: 1332b56c81d2d6c3d0d122002a4ba01db3ab9e09
SHA256: 70A800B3D8A15E5B22EDB7DBE20F9B33C0A8F0DDCEC34C3B3571C1F21CC72BE7
File Size: 3.56 MB, 3564915 bytes
MD5: 2152e1a2db6cb0fe26865e014d3c3708
SHA1: 8535f6823116a242fa1f1b17d5cf310f7b9ed702
SHA256: 6B44A1331EFDA59B1BB7CB30E1ECDFE5525176B5138419E1EA8B4200D9781AED
File Size: 5.10 MB, 5099153 bytes
MD5: 8ee506242bda67dfc311dbacc4988849
SHA1: 584b317dc5a2a21d468c76285703f536e50a78ac
SHA256: FB2FFB23E00C8C073FDCE9F86EA61CD7215FB899A46BEEF74B7DF5740C596967
File Size: 1.54 MB, 1543125 bytes
MD5: a24c72433d0f359bf9d1f9c29f6fe893
SHA1: 31007efa939e48d702c7fed186b407eb81f3bda6
SHA256: 6E59449D29B0F0E9353338641D746DAF7175E3E72B9404B03594C4BF4A71BFED
File Size: 3.04 MB, 3037059 bytes
MD5: 6fd3ff4f5f004f1a9b5a176bc5463695
SHA1: 21c26c543cb8fd392c8e85b2b8e8aade0ca053a3
SHA256: EAACF977A2FE3246572A419557250297EF30504B921E877B55450E43687F9DA9
File Size: 3.34 MB, 3343204 bytes
MD5: b51d466c33b491663bdee86e3f9c20a2
SHA1: 83c35028ebcbf4238473de9ce8f5f6730258d86b
SHA256: 0F585073C685E58F2C7D689E2F3EF588F54D4F3A5DE4B6158D0B912EC097BF43
File Size: 5.30 MB, 5300224 bytes
MD5: cdd08760f69ed36d388b8ca71e8a512b
SHA1: d3be43686ee587463005de24afe683748abf651b
SHA256: E1F2B45BCB2A5F25988315AD679199E5AC948655F40676D181E5D68464396A3D
File Size: 1.28 MB, 1276891 bytes
MD5: 86e32cb2ac07ef11b776276cecd5f656
SHA1: e52e209a010f7facae299ea2e6c0b4a9307b4b20
SHA256: F10103F8046D1ED39D9E6A7C27C8AE91CA0D2ED896CD4D2F9BB0FA6C451E37EE
File Size: 1.50 MB, 1499336 bytes
MD5: a725b4221644408c9289f979c02b6555
SHA1: 39533338475ee7060e4a7d0e9a7f1abfad9a1be8
SHA256: B6578A9AD76D85467E17C0A375CA1FCFD6AA3328076F9D575193BECD4676DA0D
File Size: 2.64 MB, 2642428 bytes
MD5: 703e3a0a35715e114856c0c72785e1a1
SHA1: 89435e5d31012d156da75b151510f8ae83d8ad51
SHA256: 0F693C051724F75BE77BFC771B7FF7C3DFC84C15D23910B96F0D772392006D1A
File Size: 5.71 MB, 5707821 bytes
MD5: fa261725859125ecff86cb52215d8690
SHA1: 77f3654de924e62ae566a91fad1da7d6e6ac56e9
SHA256: CE1DD77F6749EA4056AC2DFB4DC26B9F088A76E8A42BC2994FF6C64F26E23CB8
File Size: 4.89 MB, 4892472 bytes
MD5: 44061f5d45d8ea7ee24c9039025a26ab
SHA1: 3f3efb79fec88ab0b12d77de72fd40cb19a72a39
SHA256: 4FCA1B4F7184D0153C4322BBACA3293B792649D82A7C2FE2154C07C5245848E8
File Size: 828.67 KB, 828666 bytes
MD5: 406b5a400dca1ead3603ea44722ec557
SHA1: 1901462354b05335347dd9d7d3790a6d4927465d
SHA256: 87DFF60AB7CC783E3156FD2DEE89DB9CDC09B4C2B408E806829590376911E4C6
File Size: 496.79 KB, 496793 bytes
MD5: f27882e126d3911e92f69ace63ecf27a
SHA1: 735389c7f12b54449f19377b8f6312b13b204388
SHA256: BB643D973D5DF9182BA331FD072F0B6F2F9F55675D4F73E265963A40233AB9CF
File Size: 1.37 MB, 1370686 bytes
MD5: 4f5cb3d91d11eb4b5f7c165c48eb3989
SHA1: 76e8ea2bc6c43b3302d8df82748a6b3e5625b59c
SHA256: 51F9C37A28120BAEE9C8B38E986DCA8199D81C4D8D0A8DFBD6DF0B619967771E
File Size: 1.40 MB, 1401765 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File has been packed
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

File Traits

  • big overlay
  • No Version Info
  • packed
  • x86

Block Information

Total Blocks: 318
Potentially Malicious Blocks: 146
Whitelisted Blocks: 172
Unknown Blocks: 0

Visual Map

x x x x x x x x x x x x 0 x x x x x x x x x x x x x x x 0 x x x x x x 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 x x 0 0 x x x x x x x x x x x x x x x x x x x x x 0 0 x x 0 x x x x x x x x x x x x 0 x x 0 x x x x x x x x x x x x x x 0 0 x x x x x x 0 0 x 0 0 0 0 x x x 0 0 x x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Babar.TC

Files Modified

File Attributes
c:\users\user\appdata\local\temp\_if11c2.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\_if11c4.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\_if421f.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\_if4221.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\_if45cf.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\_if45d1.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\_if4c16.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\_if4c28.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\_if54a8.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\_if54ba.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
Show More
c:\users\user\appdata\local\temp\_if56cb.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\_if56dd.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\_if5709.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\_if571b.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\_if5d6e.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\_if5d70.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\_if6cbe.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\_if6ccf.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\_if7330.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\_if7332.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\_if85d8.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\_if85da.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\_ifb828.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\_ifb82a.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\_ifcb52.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\_ifcb54.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\_ifd776.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\_ifd788.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\_iffd51.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\_iffd53.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\windows\ifinst27.exe Generic Write,Read Attributes

Windows API Usage

Category API
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
Anti Debug
  • IsDebuggerPresent
User Data Access
  • GetUserObjectInformation

Shell Command Execution

"C:\WINDOWS\IFinst27.exe" -Ic:\users\user\downloads\4d6ec038e57bfc749cb48c700f0682863848d576_0000840641.exe
"C:\WINDOWS\IFinst27.exe" -Ic:\users\user\downloads\736568abded83fa153245c35c3aced141d1136bb_0001216587.exe
"C:\WINDOWS\IFinst27.exe" -Ic:\users\user\downloads\1935f14e93a49d9ae682be774edd4166a5ce2013_0001580127.exe
"C:\WINDOWS\IFinst27.exe" -Ic:\users\user\downloads\247ef34fa48fe548298d22fb12321e47493cf1b7_0005871383
"C:\WINDOWS\IFinst27.exe" -Ic:\users\user\downloads\fc8f97216308a5ca6ea75b970b073dd195f49d75_0003000332
Show More
"C:\WINDOWS\IFinst27.exe" -Ic:\users\user\downloads\33f15e7258467d02ee0d123e318091261f6e8177_0005271159
"C:\WINDOWS\IFinst27.exe" -Ic:\users\user\downloads\cd9c33bd565794cf7389164513ddd293e8c30612_0000195531
"C:\WINDOWS\IFinst27.exe" -Ic:\users\user\downloads\8487c01907861f1e3423168e33132cf1415fecc6_0003359009
"C:\WINDOWS\IFinst27.exe" -Ic:\users\user\downloads\2d0c84c42d7680dd684c87778d9c9da822a7d65d_0005129525
"C:\WINDOWS\IFinst27.exe" -Ic:\users\user\downloads\6c9985c4234fb15b82e969d1e71989720b0d2c62_0001981341
"C:\WINDOWS\IFinst27.exe" -Ic:\users\user\downloads\1332b56c81d2d6c3d0d122002a4ba01db3ab9e09_0003564915
"C:\WINDOWS\IFinst27.exe" -Ic:\users\user\downloads\8535f6823116a242fa1f1b17d5cf310f7b9ed702_0005099153
"C:\WINDOWS\IFinst27.exe" -Ic:\users\user\downloads\584b317dc5a2a21d468c76285703f536e50a78ac_0001543125
"C:\WINDOWS\IFinst27.exe" -Ic:\users\user\downloads\31007efa939e48d702c7fed186b407eb81f3bda6_0003037059
"C:\WINDOWS\IFinst27.exe" -Ic:\users\user\downloads\21c26c543cb8fd392c8e85b2b8e8aade0ca053a3_0003343204
"C:\WINDOWS\IFinst27.exe" -Ic:\users\user\downloads\83c35028ebcbf4238473de9ce8f5f6730258d86b_0005300224
"C:\WINDOWS\IFinst27.exe" -Ic:\users\user\downloads\d3be43686ee587463005de24afe683748abf651b_0001276891
"C:\WINDOWS\IFinst27.exe" -Ic:\users\user\downloads\e52e209a010f7facae299ea2e6c0b4a9307b4b20_0001499336
"C:\WINDOWS\IFinst27.exe" -Ic:\users\user\downloads\39533338475ee7060e4a7d0e9a7f1abfad9a1be8_0002642428
"C:\WINDOWS\IFinst27.exe" -Ic:\users\user\downloads\89435e5d31012d156da75b151510f8ae83d8ad51_0005707821
"C:\WINDOWS\IFinst27.exe" -Ic:\users\user\downloads\77f3654de924e62ae566a91fad1da7d6e6ac56e9_0004892472
"C:\WINDOWS\IFinst27.exe" -Ic:\users\user\downloads\3f3efb79fec88ab0b12d77de72fd40cb19a72a39_0000828666
"C:\WINDOWS\IFinst27.exe" -Ic:\users\user\downloads\1901462354b05335347dd9d7d3790a6d4927465d_0000496793
"C:\WINDOWS\IFinst27.exe" -Ic:\users\user\downloads\735389c7f12b54449f19377b8f6312b13b204388_0001370686
"C:\WINDOWS\IFinst27.exe" -Ic:\users\user\downloads\76e8ea2bc6c43b3302d8df82748a6b3e5625b59c_0001401765

Trending

Most Viewed

Loading...