General

  • Target

    ea1792f689bfe5ad3597c7f877b66f9fcf80d732e5233293d52d374d50cab991.msi

  • Size

    1.6MB

  • Sample

    241110-pcv24awfnm

  • MD5

    3cb6b99b20930ac0dbadc10899dc511e

  • SHA1

    570c4ab78cf4bb22b78aac215a4a79189d4fa9ed

  • SHA256

    ea1792f689bfe5ad3597c7f877b66f9fcf80d732e5233293d52d374d50cab991

  • SHA512

    aedf58ea01d59cce191cb9c0f83dbdbf7e3e8f049c764b577d6a957cb5229c50dda7ec6760ca43ad4dbdb085ae02b07bc818f69ca08373243019af6683e4931c

  • SSDEEP

    49152:5Sj3YhW8zBQSc0ZnSKSZKumZr7A+zafUWM1q:oYY0ZnQK/A7fQ

Malware Config

Targets

    • Target

      ea1792f689bfe5ad3597c7f877b66f9fcf80d732e5233293d52d374d50cab991.msi

    • Size

      1.6MB

    • MD5

      3cb6b99b20930ac0dbadc10899dc511e

    • SHA1

      570c4ab78cf4bb22b78aac215a4a79189d4fa9ed

    • SHA256

      ea1792f689bfe5ad3597c7f877b66f9fcf80d732e5233293d52d374d50cab991

    • SHA512

      aedf58ea01d59cce191cb9c0f83dbdbf7e3e8f049c764b577d6a957cb5229c50dda7ec6760ca43ad4dbdb085ae02b07bc818f69ca08373243019af6683e4931c

    • SSDEEP

      49152:5Sj3YhW8zBQSc0ZnSKSZKumZr7A+zafUWM1q:oYY0ZnQK/A7fQ

    • Brute Ratel C4

      A customized command and control framework for red teaming and adversary simulation.

    • Bruteratel family

    • Detect BruteRatel badger

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks