Skip to main content

Inside the Kronos malware – part 2

  • August 29, 2017
  • 0 replies
  • 2 views

Jasper_The_Rasper
Moderator
Forum|alt.badge.img+54
See Also - Inside the Kronos malware – part 1
 
August 29th, 2017  By Malwarebytes Labs
 


 
In the previous part of the Kronos analysis, we took a look at the installation process of Kronos and explained the technical details of the tricks that Kronos uses in order to remain more stealthy. Now we will move on to look at the malicious actions that Kronos can perform.

Analyzed samples

 
[/list]Special thanks to @shotgunner101 and @chrisdoman for sharing the samples.

 

Configuration and targets

 
Kronos is known as a banking Trojan. For the purpose of enabling and configuring this feature, the bot may download from its CnC additional configuration file. After being fetched, it is stored in the installation folder in encrypted form. (It is worth to notice that when the config is sent over the network it is encrypted using AES CBC mode – but when it is stored on the disk, AES in ECB mode is used.)
 
Full Article.