Analysis
-
max time kernel
20s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-11-2024 14:54
Behavioral task
behavioral1
Sample
196b4d327d8cc1fab8d801c19872c0b084d7485aeb1a103396652ff40fae45e1.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
196b4d327d8cc1fab8d801c19872c0b084d7485aeb1a103396652ff40fae45e1.dll
Resource
win10v2004-20241007-en
General
-
Target
196b4d327d8cc1fab8d801c19872c0b084d7485aeb1a103396652ff40fae45e1.dll
-
Size
233KB
-
MD5
e7afaf7e063d5c07dbbc2bc8cd7832f6
-
SHA1
91c785431d3489743e59df2889b9c495443bc277
-
SHA256
196b4d327d8cc1fab8d801c19872c0b084d7485aeb1a103396652ff40fae45e1
-
SHA512
e38684cbcbe6ae88c0cd98874231cbb34d67cdacb3c03d3f61cea61a1396b259be8a799c500bbfec2677788750c56fe36e6e4acf281107e5659eef814ebd2ce6
-
SSDEEP
3072:2Bs/p0Fq9NCotWnnPWDrfBcskSKGD4HUNjeFlGOBuhvgxgsZLqPXPCbUW5JbLVYO:WsxjCotWkESsWIusRuKbN513Qau81U
Malware Config
Signatures
-
Brute Ratel C4
A customized command and control framework for red teaming and adversary simulation.
-
Bruteratel family
-
Detect BruteRatel badger 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2452-0-0x0000000000370000-0x00000000003A7000-memory.dmp family_bruteratel -
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exeflow pid Process 4 2452 rundll32.exe 5 2452 rundll32.exe