Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 03:36
Static task
static1
Behavioral task
behavioral1
Sample
c96ec96ea29372311cbef1d2b23f0e51b06f1f6184a41da985142929d9fa2f02.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c96ec96ea29372311cbef1d2b23f0e51b06f1f6184a41da985142929d9fa2f02.dll
Resource
win10v2004-20241007-en
General
-
Target
c96ec96ea29372311cbef1d2b23f0e51b06f1f6184a41da985142929d9fa2f02.dll
-
Size
2.0MB
-
MD5
933e9c63811494279963276486c600a4
-
SHA1
c22863176e2d68ea9a27963e2ed8aa706910616a
-
SHA256
c96ec96ea29372311cbef1d2b23f0e51b06f1f6184a41da985142929d9fa2f02
-
SHA512
de8990be0a11f2be95ffbdeb8388259e6becc79bc6c9371df3b6cb3348ae07c4827edcc762a18e32af1e5cfde1ebf98f8711827b544bb802c1b2d94a902c8cc8
-
SSDEEP
49152:UnmL3YxQBxRpQrLESwW0eCPR+G54lC4iaoV0Z2HCv5:w5wYCV4iaoV0U
Malware Config
Signatures
-
Brute Ratel C4
A customized command and control framework for red teaming and adversary simulation.
-
Bruteratel family
-
Detect BruteRatel badger 1 IoCs
Processes:
resource yara_rule behavioral2/memory/948-10-0x000001DBC5E80000-0x000001DBC5EBE000-memory.dmp family_bruteratel -
Blocklisted process makes network request 14 IoCs
Processes:
rundll32.exeflow pid process 16 948 rundll32.exe 18 948 rundll32.exe 20 948 rundll32.exe 25 948 rundll32.exe 27 948 rundll32.exe 29 948 rundll32.exe 31 948 rundll32.exe 33 948 rundll32.exe 61 948 rundll32.exe 66 948 rundll32.exe 67 948 rundll32.exe 68 948 rundll32.exe 71 948 rundll32.exe 72 948 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
rundll32.exepid process 948 rundll32.exe 948 rundll32.exe 948 rundll32.exe 948 rundll32.exe 948 rundll32.exe 948 rundll32.exe 948 rundll32.exe 948 rundll32.exe