General

  • Target

    29549b75a198ad3aee4f8b9ea328bc9a73eb0e0d07e36775438bbe7268d453f9.msi

  • Size

    1.6MB

  • Sample

    241103-k2lshazlcv

  • MD5

    9775cb36162fab5d8dbe372cd5910ba7

  • SHA1

    a06d73422ecb931b6b6ae9f2af5f08f50b3d52dc

  • SHA256

    29549b75a198ad3aee4f8b9ea328bc9a73eb0e0d07e36775438bbe7268d453f9

  • SHA512

    42cc3d3746fc416097b7de340cf1782febe957ee45e17b5c368f6509bb5112cfdd808d223283ef424b5ee1aab0dddc78562a778f196f7962c3f27839f4f60564

  • SSDEEP

    49152:gfj3YhW8zBQSc0ZnSKSZKumZr7AlFBBdtM:cYY0ZnQK/AlprM

Malware Config

Targets

    • Target

      29549b75a198ad3aee4f8b9ea328bc9a73eb0e0d07e36775438bbe7268d453f9.msi

    • Size

      1.6MB

    • MD5

      9775cb36162fab5d8dbe372cd5910ba7

    • SHA1

      a06d73422ecb931b6b6ae9f2af5f08f50b3d52dc

    • SHA256

      29549b75a198ad3aee4f8b9ea328bc9a73eb0e0d07e36775438bbe7268d453f9

    • SHA512

      42cc3d3746fc416097b7de340cf1782febe957ee45e17b5c368f6509bb5112cfdd808d223283ef424b5ee1aab0dddc78562a778f196f7962c3f27839f4f60564

    • SSDEEP

      49152:gfj3YhW8zBQSc0ZnSKSZKumZr7AlFBBdtM:cYY0ZnQK/AlprM

    • Brute Ratel C4

      A customized command and control framework for red teaming and adversary simulation.

    • Bruteratel family

    • Detect BruteRatel badger

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks