MS4killer

Malware updated 5 months ago (2024-11-29T14:53:48.402Z)
Download STIX
Preview STIX
MS4Killer is a highly sophisticated malware that was observed in ransomware incidents targeting US companies in July 2024. It is part of a new toolkit developed by the Embargo group, which includes MDeployer, a loader designed to deploy Embargo's ransomware and other payloads, and MS4Killer, an Endpoint Detection and Response (EDR) killer. This malware is custom compiled for each victim's environment, targeting selected security solutions, thereby increasing its potency. The toolkit appears to be under active development, as evidenced by slight variations in the versions of MDeployer and MS4Killer observed during different intrusions. The MS4Killer malware operates by disabling security products using a technique known as bring your own vulnerable driver (BYOVD). Once deployed on a compromised system, the MDeployer tool decrypts and executes the MS4Killer payload, followed by the Embargo ransomware. It then proceeds to execute two payloads, MS4Killer and Embargo ransomware, and decrypts two encrypted files, a.cache and b.cache, that were dropped by an unknown previous stage. After the ransomware finishes encrypting the system, MDeployer terminates the MS4Killer process, deletes the decrypted payloads and a driver file dropped by MS4Killer, and reboots the system. Both MDeployer and MS4Killer are written in Rust, suggesting it is the preferred programming language for the group's developers. MS4Killer appears to have been inspired by a proof-of-concept tool named s4killer, but the functionality has been enhanced by Embargo to make it more effective in real-world attacks. MS4Killer poses a significant threat due to its ability to evade defense mechanisms, terminate security product processes from the kernel by installing and abusing a vulnerable driver stored in a global variable, and its tailored approach to each victim's environment.
Description last updated: 2024-10-29T19:58:36.436Z
What's your take? (Question 1 of 4)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Tool
Ransomware
Loader
Payload
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Malware
To see the evidence that has resulted in these malware associations, create a free account
Alias DescriptionAssociation TypeVotes
The mDeployer Malware is associated with MS4killer. mDeployer is a malicious software (malware) that was first observed during ransomware incidents targeting US companies in July 2024. The malware, part of a new toolkit, consists of two main components: a loader named MDeployer and an Endpoint Detection and Response (EDR) killer called MS4Killer. ThiUnspecified
3
Source Document References
Information about the MS4killer Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more