General

  • Target

    9730c6a486d63400cd6b169ddcb52c0bfdf1ff61ad6ca58d774062b7f6a69ade

  • Size

    439KB

  • Sample

    241205-a76dzszlft

  • MD5

    d61e27170c416bc9f10d9bbb4b47f10f

  • SHA1

    404e394e1887a62942e1c2730acb512c21820e73

  • SHA256

    9730c6a486d63400cd6b169ddcb52c0bfdf1ff61ad6ca58d774062b7f6a69ade

  • SHA512

    1fbe52b726a740e9305a9f45bca16b8d94c3f4a954688cefb55b47cce859da6c0bbba3dbac24f5ad4145bd275f303ae4c9210cc05d08fe9c78ec099b5d3787e4

  • SSDEEP

    12288:c6PeKm2OPeKm22Vtp90NtmVtp90NtXONt:1pEkpEY

Malware Config

Targets

    • Target

      9730c6a486d63400cd6b169ddcb52c0bfdf1ff61ad6ca58d774062b7f6a69ade

    • Size

      439KB

    • MD5

      d61e27170c416bc9f10d9bbb4b47f10f

    • SHA1

      404e394e1887a62942e1c2730acb512c21820e73

    • SHA256

      9730c6a486d63400cd6b169ddcb52c0bfdf1ff61ad6ca58d774062b7f6a69ade

    • SHA512

      1fbe52b726a740e9305a9f45bca16b8d94c3f4a954688cefb55b47cce859da6c0bbba3dbac24f5ad4145bd275f303ae4c9210cc05d08fe9c78ec099b5d3787e4

    • SSDEEP

      12288:c6PeKm2OPeKm22Vtp90NtmVtp90NtXONt:1pEkpEY

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Brute Ratel C4

      A customized command and control framework for red teaming and adversary simulation.

    • Bruteratel family

    • Detect BruteRatel badger

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks