Skip to content

Commit 7ad475e

Browse files
Update tmp.md
1 parent 0f8ae73 commit 7ad475e

File tree

1 file changed

+46
-0
lines changed

1 file changed

+46
-0
lines changed

_tmp/tmp.md

Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
---
2+
title: "BruteRatel Open FrameWork"
3+
date: 2025-04-30
4+
---
5+
6+
<link rel="stylesheet" href="/css/main.css">
7+
8+
## BRUTERATEL OPEN FRAMEWORK
9+
10+
## Context
11+
12+
Initial BruteRatel Sample SHA256 : d8080b4f7a238f28435649f74fdd5679f7f7133ea81d12d9f10b05017b0897b1
13+
14+
Initial Sample Source :
15+
[bazaar.abuse.ch](https://bazaar.abuse.ch/sample/d8080b4f7a238f28435649f74fdd5679f7f7133ea81d12d9f10b05017b0897b1/)
16+
17+
VirusTotal :
18+
[VirusTotal](https://www.virustotal.com/gui/file/d8080b4f7a238f28435649f74fdd5679f7f7133ea81d12d9f10b05017b0897b1)
19+
20+
# INTRO
21+
22+
Conveniently sold as a 'red teaming tool' with advanced capabilities to avoid detection from EDR and antivirus, BruteRatel is unsurprisingly used and abused by various cybercrime or state sponsored threat actors :
23+
24+
[BruteRatel and CVE-2025-31324](https://reliaquest.com/blog/threat-spotlight-reliaquest-uncovers-vulnerability-behind-sap-netweaver-compromise/)
25+
[BruteRatel and APT29](https://unit42.paloaltonetworks.com/brute-ratel-c4-tool/)
26+
27+
As a mean to raise awareness and help blue teams better understand the threat posed by this specific tool, I publish a [stripped-down version](https://bazaar.abuse.ch/sample/) from a sample found in the wild and uploaded on bazar.abuse.ch
28+
29+
This version has been modified in the following fashion :
30+
31+
- The First stage loader/obfuscator have been removed
32+
- The inner payload only connects to the following local IP : http://192.168.30.46/admin.php on port 80
33+
- SSL encryption has been removed
34+
35+
I also publish a basic php framework to issue commands to this modified sample :
36+
37+
https://github.com/cedricg-mirror/reflexions/tree/main/CyberCrime/BRUTERATEL/Framework
38+
39+
This is a very basic php framework meant to test various commands from the malware and doesn't offer any 'C2' features
40+
41+
A summary from most commands available from this sample is available on my [blog](https://cedricg-mirror.github.io/2025/03/24/BruteRatelCommandList.html)
42+
43+
I didn't fully reverse / understood evry commands available nor do I intend to do so
44+
45+
46+

0 commit comments

Comments
 (0)