General
-
Target
ea1792f689bfe5ad3597c7f877b66f9fcf80d732e5233293d52d374d50cab991.msi
-
Size
1.6MB
-
Sample
241110-pcv24awfnm
-
MD5
3cb6b99b20930ac0dbadc10899dc511e
-
SHA1
570c4ab78cf4bb22b78aac215a4a79189d4fa9ed
-
SHA256
ea1792f689bfe5ad3597c7f877b66f9fcf80d732e5233293d52d374d50cab991
-
SHA512
aedf58ea01d59cce191cb9c0f83dbdbf7e3e8f049c764b577d6a957cb5229c50dda7ec6760ca43ad4dbdb085ae02b07bc818f69ca08373243019af6683e4931c
-
SSDEEP
49152:5Sj3YhW8zBQSc0ZnSKSZKumZr7A+zafUWM1q:oYY0ZnQK/A7fQ
Static task
static1
Behavioral task
behavioral1
Sample
ea1792f689bfe5ad3597c7f877b66f9fcf80d732e5233293d52d374d50cab991.msi
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea1792f689bfe5ad3597c7f877b66f9fcf80d732e5233293d52d374d50cab991.msi
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
ea1792f689bfe5ad3597c7f877b66f9fcf80d732e5233293d52d374d50cab991.msi
-
Size
1.6MB
-
MD5
3cb6b99b20930ac0dbadc10899dc511e
-
SHA1
570c4ab78cf4bb22b78aac215a4a79189d4fa9ed
-
SHA256
ea1792f689bfe5ad3597c7f877b66f9fcf80d732e5233293d52d374d50cab991
-
SHA512
aedf58ea01d59cce191cb9c0f83dbdbf7e3e8f049c764b577d6a957cb5229c50dda7ec6760ca43ad4dbdb085ae02b07bc818f69ca08373243019af6683e4931c
-
SSDEEP
49152:5Sj3YhW8zBQSc0ZnSKSZKumZr7A+zafUWM1q:oYY0ZnQK/A7fQ
-
Brute Ratel C4
A customized command and control framework for red teaming and adversary simulation.
-
Bruteratel family
-
Detect BruteRatel badger
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-