General
-
Target
https://cdn.discordapp.com/attachments/1284475802603491411/1284491094217982014/rkill.exe?ex=66e6d30d&is=66e5818d&hm=1d5f196c5aefe8ee9c5de3dfa220e9895802cbd0a5be33ba705b9211f263cc87&
-
Sample
240914-ppfsyathjf
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1284475802603491411/1284491094217982014/rkill.exe?ex=66e6d30d&is=66e5818d&hm=1d5f196c5aefe8ee9c5de3dfa220e9895802cbd0a5be33ba705b9211f263cc87&
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
https://cdn.discordapp.com/attachments/1284475802603491411/1284491094217982014/rkill.exe?ex=66e6d30d&is=66e5818d&hm=1d5f196c5aefe8ee9c5de3dfa220e9895802cbd0a5be33ba705b9211f263cc87&
Score8/10-
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Image File Execution Options Injection
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1