Overview
overview
3Static
static
3KRNL-REBORN.zip
windows7-x64
1KRNL-REBORN.zip
windows10-2004-x64
1KRNL-REBORN.zip
macos-10.15-amd64
1KRNL-REBORN.zip
ubuntu-18.04-amd64
KRNL-REBORN.zip
debian-9-armhf
KRNL-REBORN.zip
debian-9-mips
KRNL-REBORN.zip
debian-9-mipsel
KRNL-REBOR....3.dll
windows7-x64
1KRNL-REBOR....3.dll
windows10-2004-x64
1KRNL-REBOR....3.dll
macos-10.15-amd64
1KRNL-REBOR....3.dll
ubuntu-18.04-amd64
KRNL-REBOR....3.dll
debian-9-armhf
KRNL-REBOR....3.dll
debian-9-mips
KRNL-REBOR....3.dll
debian-9-mipsel
KRNL-REBORN/README.md
windows7-x64
3KRNL-REBORN/README.md
windows10-2004-x64
3KRNL-REBORN/README.md
macos-10.15-amd64
1KRNL-REBORN/README.md
ubuntu-18.04-amd64
KRNL-REBORN/README.md
debian-9-armhf
KRNL-REBORN/README.md
debian-9-mips
KRNL-REBORN/README.md
debian-9-mipsel
KRNL-REBOR...ET.dll
windows7-x64
1KRNL-REBOR...ET.dll
windows10-2004-x64
1KRNL-REBOR...ET.dll
macos-10.15-amd64
1KRNL-REBOR...ET.dll
ubuntu-18.04-amd64
KRNL-REBOR...ET.dll
debian-9-armhf
KRNL-REBOR...ET.dll
debian-9-mips
KRNL-REBOR...ET.dll
debian-9-mipsel
KRNL-REBOR...ec.lnk
windows7-x64
3KRNL-REBOR...ec.lnk
windows10-2004-x64
3KRNL-REBOR...ec.lnk
macos-10.15-amd64
1KRNL-REBOR...ec.lnk
ubuntu-18.04-amd64
Resubmissions
17-11-2024 22:23
241117-2a4yfazclg 3Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-11-2024 22:23
Static task
static1
Behavioral task
behavioral1
Sample
KRNL-REBORN.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
KRNL-REBORN.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
KRNL-REBORN.zip
Resource
macos-20241101-en
Behavioral task
behavioral4
Sample
KRNL-REBORN.zip
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral5
Sample
KRNL-REBORN.zip
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral6
Sample
KRNL-REBORN.zip
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral7
Sample
KRNL-REBORN.zip
Resource
debian9-mipsel-20240729-en
Behavioral task
behavioral8
Sample
KRNL-REBORN/Bunifu_UI_v1.5.3.dll
Resource
win7-20241023-en
Behavioral task
behavioral9
Sample
KRNL-REBORN/Bunifu_UI_v1.5.3.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral10
Sample
KRNL-REBORN/Bunifu_UI_v1.5.3.dll
Resource
macos-20241106-en
Behavioral task
behavioral11
Sample
KRNL-REBORN/Bunifu_UI_v1.5.3.dll
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral12
Sample
KRNL-REBORN/Bunifu_UI_v1.5.3.dll
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral13
Sample
KRNL-REBORN/Bunifu_UI_v1.5.3.dll
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral14
Sample
KRNL-REBORN/Bunifu_UI_v1.5.3.dll
Resource
debian9-mipsel-20240418-en
Behavioral task
behavioral15
Sample
KRNL-REBORN/README.md
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
KRNL-REBORN/README.md
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
KRNL-REBORN/README.md
Resource
macos-20241101-en
Behavioral task
behavioral18
Sample
KRNL-REBORN/README.md
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral19
Sample
KRNL-REBORN/README.md
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral20
Sample
KRNL-REBORN/README.md
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral21
Sample
KRNL-REBORN/README.md
Resource
debian9-mipsel-20240418-en
Behavioral task
behavioral22
Sample
KRNL-REBORN/ScintillaNET.dll
Resource
win7-20240903-en
Behavioral task
behavioral23
Sample
KRNL-REBORN/ScintillaNET.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral24
Sample
KRNL-REBORN/ScintillaNET.dll
Resource
macos-20241106-en
Behavioral task
behavioral25
Sample
KRNL-REBORN/ScintillaNET.dll
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral26
Sample
KRNL-REBORN/ScintillaNET.dll
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral27
Sample
KRNL-REBORN/ScintillaNET.dll
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral28
Sample
KRNL-REBORN/ScintillaNET.dll
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral29
Sample
KRNL-REBORN/autoexec.lnk
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
KRNL-REBORN/autoexec.lnk
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
KRNL-REBORN/autoexec.lnk
Resource
macos-20241101-en
Behavioral task
behavioral32
Sample
KRNL-REBORN/autoexec.lnk
Resource
ubuntu1804-amd64-20240508-en
General
-
Target
KRNL-REBORN/README.md
-
Size
149B
-
MD5
c18b6c47951ce8cdcc31b39e7e535726
-
SHA1
f23c69116a7c43c793f47f72dd2d3856116ea330
-
SHA256
fde9ed5b5f3cc7318a0c4c25919e36322f96ed6adaa5f1ca775e68d8259d9ae4
-
SHA512
be4da91dbd657b3c7cd5fee90a33a99120484fd4e065379aef482bfb64d8cd5d637390b7c85a6090143cdaa161d6575d64a8139a6e2b0aed7a773a060548bdcf
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2824 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2824 AcroRd32.exe 2824 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2520 2380 cmd.exe 31 PID 2380 wrote to memory of 2520 2380 cmd.exe 31 PID 2380 wrote to memory of 2520 2380 cmd.exe 31 PID 2520 wrote to memory of 2824 2520 rundll32.exe 33 PID 2520 wrote to memory of 2824 2520 rundll32.exe 33 PID 2520 wrote to memory of 2824 2520 rundll32.exe 33 PID 2520 wrote to memory of 2824 2520 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\KRNL-REBORN\README.md1⤵
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\KRNL-REBORN\README.md2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\KRNL-REBORN\README.md"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2824
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD54fb14da0cc6ac750c5eeee5eec867aaf
SHA14261c09f1eebab389aa583c8c53eb4efea821859
SHA256687fad443ab78d051aef7296f390b3a0153c706a87b0ad7172a32247d181f8b8
SHA512df368f1942e323ff37c272144d7a564709d5e4023f4bac46163a52fb4358d01cd7ccaaf4280316d980832408c13efb4fadc9ad30349334446333e1f677c9fcd2