General
-
Target
26b519786c62293ca6fa12347a66228efb4de2eaade2609f69d34a821f0cf594
-
Size
261KB
-
Sample
250219-hd7c7a1py4
-
MD5
fac1cc5f820141ec14629225eb9a49f1
-
SHA1
3ad4a0edcd74605ce8cbb346e559038de0b76820
-
SHA256
26b519786c62293ca6fa12347a66228efb4de2eaade2609f69d34a821f0cf594
-
SHA512
3aa77b5b2a9e279329dd6de391af445c6f295e764f2a86a0fb5ec5024a10467c25dc1f1b0d54af12f9ec8faa2b710a8ce7185969ca2139103e2b2fd78e9462a9
-
SSDEEP
6144:FrSwniqL48g03KvWiNx7/3n0u8Z0E0U0Y7O1wmYwL:h1niqL48gwKOi7n0u8Z0E0jaC/
Static task
static1
Behavioral task
behavioral1
Sample
26b519786c62293ca6fa12347a66228efb4de2eaade2609f69d34a821f0cf594.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
26b519786c62293ca6fa12347a66228efb4de2eaade2609f69d34a821f0cf594.exe
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
26b519786c62293ca6fa12347a66228efb4de2eaade2609f69d34a821f0cf594
-
Size
261KB
-
MD5
fac1cc5f820141ec14629225eb9a49f1
-
SHA1
3ad4a0edcd74605ce8cbb346e559038de0b76820
-
SHA256
26b519786c62293ca6fa12347a66228efb4de2eaade2609f69d34a821f0cf594
-
SHA512
3aa77b5b2a9e279329dd6de391af445c6f295e764f2a86a0fb5ec5024a10467c25dc1f1b0d54af12f9ec8faa2b710a8ce7185969ca2139103e2b2fd78e9462a9
-
SSDEEP
6144:FrSwniqL48g03KvWiNx7/3n0u8Z0E0U0Y7O1wmYwL:h1niqL48gwKOi7n0u8Z0E0jaC/
Score10/10-
Brute Ratel C4
A customized command and control framework for red teaming and adversary simulation.
-
Bruteratel family
-
Detect BruteRatel badger
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-