Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 12:21
Static task
static1
Behavioral task
behavioral1
Sample
c96ec96ea29372311cbef1d2b23f0e51b06f1f6184a41da985142929d9fa2f02.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c96ec96ea29372311cbef1d2b23f0e51b06f1f6184a41da985142929d9fa2f02.dll
Resource
win10v2004-20241007-en
General
-
Target
c96ec96ea29372311cbef1d2b23f0e51b06f1f6184a41da985142929d9fa2f02.dll
-
Size
2.0MB
-
MD5
933e9c63811494279963276486c600a4
-
SHA1
c22863176e2d68ea9a27963e2ed8aa706910616a
-
SHA256
c96ec96ea29372311cbef1d2b23f0e51b06f1f6184a41da985142929d9fa2f02
-
SHA512
de8990be0a11f2be95ffbdeb8388259e6becc79bc6c9371df3b6cb3348ae07c4827edcc762a18e32af1e5cfde1ebf98f8711827b544bb802c1b2d94a902c8cc8
-
SSDEEP
49152:UnmL3YxQBxRpQrLESwW0eCPR+G54lC4iaoV0Z2HCv5:w5wYCV4iaoV0U
Malware Config
Signatures
-
Brute Ratel C4
A customized command and control framework for red teaming and adversary simulation.
-
Bruteratel family
-
Detect BruteRatel badger 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4112-1-0x000001C5BD910000-0x000001C5BD94E000-memory.dmp family_bruteratel -
Blocklisted process makes network request 11 IoCs
Processes:
rundll32.exeflow pid process 14 4112 rundll32.exe 17 4112 rundll32.exe 20 4112 rundll32.exe 43 4112 rundll32.exe 45 4112 rundll32.exe 47 4112 rundll32.exe 49 4112 rundll32.exe 51 4112 rundll32.exe 60 4112 rundll32.exe 62 4112 rundll32.exe 68 4112 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
rundll32.exepid process 4112 rundll32.exe 4112 rundll32.exe 4112 rundll32.exe 4112 rundll32.exe 4112 rundll32.exe 4112 rundll32.exe