General

  • Target

    26b519786c62293ca6fa12347a66228efb4de2eaade2609f69d34a821f0cf594

  • Size

    261KB

  • Sample

    250218-zn6m3sypat

  • MD5

    fac1cc5f820141ec14629225eb9a49f1

  • SHA1

    3ad4a0edcd74605ce8cbb346e559038de0b76820

  • SHA256

    26b519786c62293ca6fa12347a66228efb4de2eaade2609f69d34a821f0cf594

  • SHA512

    3aa77b5b2a9e279329dd6de391af445c6f295e764f2a86a0fb5ec5024a10467c25dc1f1b0d54af12f9ec8faa2b710a8ce7185969ca2139103e2b2fd78e9462a9

  • SSDEEP

    6144:FrSwniqL48g03KvWiNx7/3n0u8Z0E0U0Y7O1wmYwL:h1niqL48gwKOi7n0u8Z0E0jaC/

Malware Config

Targets

    • Target

      26b519786c62293ca6fa12347a66228efb4de2eaade2609f69d34a821f0cf594

    • Size

      261KB

    • MD5

      fac1cc5f820141ec14629225eb9a49f1

    • SHA1

      3ad4a0edcd74605ce8cbb346e559038de0b76820

    • SHA256

      26b519786c62293ca6fa12347a66228efb4de2eaade2609f69d34a821f0cf594

    • SHA512

      3aa77b5b2a9e279329dd6de391af445c6f295e764f2a86a0fb5ec5024a10467c25dc1f1b0d54af12f9ec8faa2b710a8ce7185969ca2139103e2b2fd78e9462a9

    • SSDEEP

      6144:FrSwniqL48g03KvWiNx7/3n0u8Z0E0U0Y7O1wmYwL:h1niqL48gwKOi7n0u8Z0E0jaC/

    • Brute Ratel C4

      A customized command and control framework for red teaming and adversary simulation.

    • Bruteratel family

    • Detect BruteRatel badger

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks