BRUTERATEL AVAILABLE COMMANDS

updated 27/04/2025

Context

BruteRatel SHA256 : d8080b4f7a238f28435649f74fdd5679f7f7133ea81d12d9f10b05017b0897b1

Sample Source :
bazaar.abuse.ch

VirusTotal :
VirusTotal

Network / C2 :
http://tiguanin[.]com/bazar.php:8041
http://tiguanin[.]com/admin.php:8041
http://bazarunet[.]com/admin.php:8041
http://bazarunet[.]com/bazar.php:8041
http://greshunka[.]com/bazar.php:8041
http://greshunka[.]com/admin.php:8041

Command ID Description Parameter
“\x9f\x3c” GetCurrentDirectory NA
“\x3f\xd5” GetIpTable NA
“\xfe\x4f” GetAccountPrivileges NA
“\x91\x03” LockWorkStation NA
“\x09\x06” GetLogicalDrives NA
“\x01\x0a” GetSystemUptime NA
“\x06\x0b” GetLastInputInfo NA
“\x03\x07” ExitProcess NA
“\x05\x06” RevertToSelf NA
“\x05\x01” GetClipBoardData NA
“\x44\xc1” EnumDevicesDrivers NA
“\x41\x9c” Screenshot NA
“\xcb\xe3” GetDomainControlerInfo NA
“\x16\xf6” GetNetworkAdaptersInfo NA
“\x03\x08” ExitThread NA
“\x34\x49” GetMemoryDump $processname
“\x39\xb3” GetTcpUdpTables NA
“\x1a\xd4” GetIpForwardTable NA
“\x9a\xbe” QuerySessionInformation NA
“\xb7\x38” GetDnsCacheDataTable NA
“\x48\x52” Fingerprint NA
“\x35\x61” EnumWindows NA
“\xe8\x73” GetInstalledProgramsList NA
“\xa3\xd9” RegisterSessionPowerSettingNotification NA
“\x59\xd3” recv $label $hostname $port
“\x59\xd4” sendto $label $hostname $port $b64_data
“\x60\xd4” send $socket, $b64_data
“\x59\xd9” closesocket $socket
“\xa1\x2d” start_keylogging NA
“\x29\x21” update_sleep_conf $int1, $int2
“\x39\x11” SetCurrentDirectory $dir_path
“\x05\xa9” CopyFileW $src, $dst
“\x05\xa9” MoveFileW $src, $dst
“\x93\xe9” DeleteFileSecure $dos_path, $secure_erase
“\x61\x3f” CreateDirectoryW $dir_path
“\x40\x8f” RemoveDirectoryW $dir_path
“\x32\x0a” listdir $dir_path
“\x59\xa9” NetInfo $option, $parameters
“\x84\xf5” CreateProcessWithLogon $domain $username $password $AppName $CommandLine
“\x99\xf9” LogonUserW $type, $domain, $username, $password
“\xb0\xe9” CreateProcessA $process_path
“\xc0\xeb” TerminateProcess $pid
“\xd0\xbe” ShellExecuteExA $verb, $file, $parameters
“\xe0\x9d” ListActiveProcess NA
“\xae\x6b” ImpersonateSystem NA
“\x39\x6f” ImpersonateSystem2 NA
“\xd9\xf3” CreateProcessGetPidTid $p1, $p2
“\xd4\x3f” CreateProcessGetPidTid2 $p1, $p2
“\x74\x2c” ReadFileW $filename, $size_in_KB
“\x36\x6c” RegEnumKeyA $hKey, $SubKey
“\x58\xb4” QueryServiceConfig $MachineName, $p2, $ServiceName
“\xea\xe2” test_base64_decode $p1
“\xa1\x13” WriteFile $filename, $data
“\x9a\x69” listen $label, $port
“\x4d\x3c” pipe_com_todo $PipeName $p2
“\x37\xfe” install_as_service $MachineName, $serviceName, $payload
“\xe9\x97” createService $MachineName, $serviceName, $path
“\x73\xfa” deleteService $MachineName, $serviceName
“\x3e\x3b” changeServiceConfig $MachineName, $serviceName, $BinaryPathName
“\x62\xc6” GetProcessInfo $processName
“\x91\xe5” port_scan $hostname, $ports
“\x81\x98” DCSync $Admin, $DomainName
“\x53\x49” netshareenum $servername, $level
“\x13\x52” ExecWQLQuery $query
“\xe7\x81” GetAccountSidFromPid $pid
“\x56\xf8 unknown $p1
“\x46\xcb” unknown2 $p1
“\x32\x49” unknown3 NA
“\x92\x64” EnumProcessModules $pid
“\x48\x73” CreateProcessSuspended $processPath
“\x44\x80” LoadManagedCode64 $binary
“\x56\x34 StartService $MachineName, $ServiceName
“\x8E\xB9 NetSessionEnum $ServerName
“\x79\x75” IDirectorySearch $HostName, $SearchFilter, $AttributeNames
“\x9a\xb9” NetUserModalsGet $ServerName
“\x9a\xb6” GetScheduledTask $serverName
“\xb3\x29” netshareenum2 $servername
“\xa9\xe4” InjectProcessShellcode $pid
“\xf3\xd8” WtsEnumProcessA $RDServerName
“\xbf\xb” UpdateConfig $config
“\xa9\xb3” count_exec_cmd $count, $sleep, $cmd
“\x9a\xe1” GetFullPathNameW $filename
“\x57\xa6” inet_ntoa $host
“\xf1\xa5” dump_process_from_pid $pid
“\x63\xd1” adjustTokenPrivilege $privilege
“\x3a\xe5” GetFileTimeStamp $filename
“\xd3\xb1” WbemCreateProcess $CommandLine
“\x3e\xf8” listdir2 $dir_path
“\xb9\xe4” GetDelegationToken $TargetName
“\x3a\xb9” ping $host
“\x9c\xda” GetCredentialsFromUiPrompt $CaptionText
“\xe4\xcd” GetThreadsInfo $pid
“\xba\xe1” InjectSetContext $pid, $tid
“\xed\xf2” connect_localhost_global_struct $index
“\xd8\x3b” WriteMemory $address, $data
“\x3b\xa2” GetUsersPwdHashes NA
“\xd2\xe3” CreateProcessSuspendedInjectThread  
“\xd9\xa7” unknown_update_global_struct TODO
“\xb3\xd2” StopService $MachineName, $ServiceName
“\x9a\x6c” DelayCmdExec $delay
“\xd1\xf3” unknown_network $ip, $port, $unknown, $unknown2
“\x8C\xED” ReflectiveDllLoading $dll
“\x8X\x9D” ReflectiveDllLoading2 $dll
“\x3B\x2D” SekurLsaPTH $unknown, $domain, $user_name, $ntlm_hash, $command_line
“\x9C\xE2” HttpGet $opt, $ServerName, $port, $ObjectName
“\x2B\xEF” GetFileSecurity $file_name
“\xB3\xD1” GlobalStructControl17 $code, $value
“\xE2\xF1” GlobalStructFree10 $code
“\xA9\xC3” GlobalStructControl15 $code, $value
“\x41\x9D” record_screen_jpg $p1, $duration