General

  • Target

    14c5a533a65d480a06439c9fdab1397e

  • Size

    1.2MB

  • Sample

    231219-2hdq8achg3

  • MD5

    14c5a533a65d480a06439c9fdab1397e

  • SHA1

    283c5c1df4d74c06b8e154a239af1454a50d2367

  • SHA256

    1ef42d19e82334cb4d078064b18e8284088dfe9161a7a73a1d9008f4d4bd7262

  • SHA512

    d4040b0da57a2b059c91710d25a0b4c1cad28e6aa29c9eefda65b95c0dc3d13a302ffad6b919102138fbf3a580d1fe462e8c72966f24fa341a07d8a29675057d

  • SSDEEP

    24576:e845rGHu6gVJKG75oFpA0VWeX442y1q2rJp0:745vRVJKGtSA0VWeofu9p0

Malware Config

Targets

    • Target

      14c5a533a65d480a06439c9fdab1397e

    • Size

      1.2MB

    • MD5

      14c5a533a65d480a06439c9fdab1397e

    • SHA1

      283c5c1df4d74c06b8e154a239af1454a50d2367

    • SHA256

      1ef42d19e82334cb4d078064b18e8284088dfe9161a7a73a1d9008f4d4bd7262

    • SHA512

      d4040b0da57a2b059c91710d25a0b4c1cad28e6aa29c9eefda65b95c0dc3d13a302ffad6b919102138fbf3a580d1fe462e8c72966f24fa341a07d8a29675057d

    • SSDEEP

      24576:e845rGHu6gVJKG75oFpA0VWeX442y1q2rJp0:745vRVJKGtSA0VWeofu9p0

    • MrBlack Trojan

      IoT botnet which infects routers to be used for DDoS attacks.

    • MrBlack trojan

    • Executes dropped EXE

    • Checks CPU configuration

      Checks CPU information which indicate if the system is a virtual machine.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Write file to user bin folder

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks