Resubmissions

19/06/2024, 22:51

240619-2s2wsszdpr 7

19/06/2024, 22:50

240619-2sjp8azdnk 1

General

  • Target

    RogueKiller_portable64.exe

  • Size

    34.6MB

  • Sample

    240619-2s2wsszdpr

  • MD5

    d6a42d318a9c4742b7b446c645e2615c

  • SHA1

    9e7dfa4188c58e966c2848100041cc558b18ba22

  • SHA256

    fed7156c1a78adefec1f97f053ab25a1a13b5334be2f859c545201a95254f243

  • SHA512

    84441f5e1fc9967a94f0d04e74fbc530b579780060fd3216a9aebf9494beaaa3323ce150f3155ef735446a70148670a146049840bcfe42f37572806acb9163d5

  • SSDEEP

    786432:DdfmlMzOJFeb4Yil6qiMfvs3uQf2j5CQchRi:RulMzOJFeb4Yi5Vfvs3uDcQcHi

Malware Config

Targets

    • Target

      RogueKiller_portable64.exe

    • Size

      34.6MB

    • MD5

      d6a42d318a9c4742b7b446c645e2615c

    • SHA1

      9e7dfa4188c58e966c2848100041cc558b18ba22

    • SHA256

      fed7156c1a78adefec1f97f053ab25a1a13b5334be2f859c545201a95254f243

    • SHA512

      84441f5e1fc9967a94f0d04e74fbc530b579780060fd3216a9aebf9494beaaa3323ce150f3155ef735446a70148670a146049840bcfe42f37572806acb9163d5

    • SSDEEP

      786432:DdfmlMzOJFeb4Yil6qiMfvs3uQf2j5CQchRi:RulMzOJFeb4Yi5Vfvs3uDcQcHi

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks