URLhaus Database

URLhaus tries to identify the malware associated with the payload served by a certain malware URL. In case URLhaus is able to identify the associated malware family, the payload will be tagged accordingly (field signature). The page below gives you an overview on payloads that URLhaus has identified as BabylonRAT.

Database Entry


Signature:BabylonRAT
Firstseen:2018-10-10 14:56:07 UTC
Lastseen:2020-02-29 19:56:23 UTC
Unique Payloads:2
URLs:2

Payload


The table below shows all payloads that have been identified as BabylonRAT.

Firstseen (UTC)SHA256File TypeFile sizeVT
2020-02-29 19:56:235488c96a3999ecb05dd319fce9b36e17dfb8fcd458c116aba5c90b38d5592db2Executable exe705'024n/a
2018-10-10 14:56:07b7170d09345e05d8147692c74b3b8790a943b5d062d4a6cea85b3fdbb8245624Executable exe855'040Virustotal results 30 / 69 (43.48)

Number of entries displayed: 2 (max: 1'000)