Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. Brute Ratel C4

Brute Ratel C4

Brute Ratel C4 is a commercial red-teaming and adversarial attack simulation tool that first appeared in December 2020.Brute Ratel C4 was specifically designed to avoid detection by endpoint detection and response (EDR) and antivirus (AV) capabilities, and deploys agents called badgers to enable arbitrary command execution for lateral movement, privilege escalation, and persistence. In September 2022, a cracked version ofBrute Ratel C4 was leaked in the cybercriminal underground, leading to its use by threat actors.[1][2][3][4][5]

ID: S1063
Associated Software: BRc4
Type: TOOL
Platforms: Windows
Contributors: Sittikorn Sangrattanapitak; Daniel Acevedo, @darmad0, ARMADO
Version: 1.1
Created: 07 February 2023
Last Modified: 19 September 2024

Associated Software Descriptions

NameDescription
BRc4

[2]

Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1087.002Account Discovery:Domain Account

Brute Ratel C4 can use LDAP queries,net group "Domain Admins" /domain andnet user /domain for discovery.[2][5]

EnterpriseT1071.001Application Layer Protocol:Web Protocols

Brute Ratel C4 can use HTTPS and HTTPS for C2 communication.[2][5]

.004Application Layer Protocol:DNS

Brute Ratel C4 can use DNS over HTTPS for C2.[2][5]

EnterpriseT1059.003Command and Scripting Interpreter:Windows Command Shell

Brute Ratel C4 can use cmd.exe for execution.[2]

EnterpriseT1005Data from Local System

Brute Ratel C4 has the ability to upload files from a compromised system.[2]

EnterpriseT1140Deobfuscate/Decode Files or Information

Brute Ratel C4 has the ability to deobfuscate its payload prior to execution.[2]

EnterpriseT1482Domain Trust Discovery

Brute Ratel C4 can use LDAP queries andnltest /domain_trusts for domain trust discovery.[2][5]

EnterpriseT1574.001Hijack Execution Flow:DLL

Brute Ratel C4 has used search order hijacking to load a malicious payload DLL as a dependency to a benign application packaged in the same ISO.[2]Brute Ratel C4 has loaded a malicious DLL by spoofing the name of the legitimate Version.DLL and placing it in the same folder as the digitally-signed Microsoft binary OneDriveUpdater.exe.[2]

EnterpriseT1562.006Impair Defenses:Indicator Blocking

Brute Ratel C4 has the ability to hide memory artifacts and to patch Event Tracing for Windows (ETW) and the Anti Malware Scan Interface (AMSI).[2][3]

EnterpriseT1105Ingress Tool Transfer

Brute Ratel C4 can download files to compromised hosts.[2][6]

EnterpriseT1036.005Masquerading:Match Legitimate Resource Name or Location

Brute Ratel C4 has used a payload file named OneDrive.update to appear benign.[2]

.008Masquerading:Masquerade File Type

Brute Ratel C4 has used Microsoft Word icons to hide malicious LNK files.[2]

EnterpriseT1106Native API

Brute Ratel C4 can call multiple Windows APIs for execution, to share memory, and defense evasion.[2][3]

EnterpriseT1046Network Service Discovery

Brute Ratel C4 can conduct port scanning against targeted systems.[2]

EnterpriseT1095Non-Application Layer Protocol

Brute Ratel C4 has the ability to use TCP for external C2.[2]

EnterpriseT1027Obfuscated Files or Information

Brute Ratel C4 has used encrypted payload files and maintains an encrypted configuration structure in memory.[2][3]

.007Dynamic API Resolution

Brute Ratel C4 can call and dynamically resolve hashed APIs.[2]

EnterpriseT1069.002Permission Groups Discovery:Domain Groups

Brute Ratel C4 can usenet group for discovery on targeted domains.[5]

EnterpriseT1057Process Discovery

Brute Ratel C4 can enumerate all processes and locate specific process IDs (PIDs).[2]

EnterpriseT1055.002Process Injection:Portable Executable Injection

Brute Ratel C4 has injectedLatrodectus into the Explorer.exe process on comrpomised hosts.[6]

EnterpriseT1572Protocol Tunneling

Brute Ratel C4 can use DNS over HTTPS for C2.[2][5]

EnterpriseT1620Reflective Code Loading

Brute Ratel C4 has used reflective loading to execute malicious DLLs.[3]

EnterpriseT1021Remote Services

Brute Ratel C4 has the ability to use RPC for lateral movement.[2]

.002SMB/Windows Admin Shares

Brute Ratel C4 has the ability to use SMB to pivot in compromised networks.[2][3][1]

.006Windows Remote Management

Brute Ratel C4 can use WinRM for pivoting.[2]

EnterpriseT1113Screen Capture

Brute Ratel C4 can take screenshots on compromised hosts.[2]

EnterpriseT1518.001Software Discovery:Security Software Discovery

Brute Ratel C4 can detect EDR userland hooks.[2]

EnterpriseT1558.003Steal or Forge Kerberos Tickets:Kerberoasting

Brute Ratel C4 can decode Kerberos 5 tickets and convert it to hashcat format for subsequent cracking.[2]

EnterpriseT1569.002System Services:Service Execution

Brute Ratel C4 can create Windows system services for execution.[2]

EnterpriseT1204.002User Execution:Malicious File

Brute Ratel C4 has gained execution through users opening malicious documents.[2]

EnterpriseT1497.003Virtualization/Sandbox Evasion:Time Based Checks

Brute Ratel C4 can callNtDelayExecution to pause execution.[2][3]

EnterpriseT1102Web Service

Brute Ratel C4 can use legitimate websites for external C2 channels including Slack, Discord, and MS Teams.[2]

EnterpriseT1047Windows Management Instrumentation

Brute Ratel C4 can use WMI to move laterally.[2]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp