General

  • Target

    25dc5e2beb7653c19515e64cba25ceec

  • Size

    1.2MB

  • Sample

    231219-2pwwdafhe3

  • MD5

    25dc5e2beb7653c19515e64cba25ceec

  • SHA1

    c6e23522a234cb7a0912c96f316f89691718829c

  • SHA256

    130cfd7c02bebcaed79a049d497f9ae49b2b61af3e8c9b6c4c54e3037ebb7b05

  • SHA512

    80730dd454d345b8e1fb86aa227697d6fd62ad9eb835955bfce66622ecc47f1f31e0446554aae7db8502f555dda35a9bbe0d64d7a6523d72575a29ed6fe5ffd4

  • SSDEEP

    24576:e845rGHu6gVJKG75oFpA0VWeX4h2y1q2rJp0:745vRVJKGtSA0VWeo4u9p0

Malware Config

Targets

    • Target

      25dc5e2beb7653c19515e64cba25ceec

    • Size

      1.2MB

    • MD5

      25dc5e2beb7653c19515e64cba25ceec

    • SHA1

      c6e23522a234cb7a0912c96f316f89691718829c

    • SHA256

      130cfd7c02bebcaed79a049d497f9ae49b2b61af3e8c9b6c4c54e3037ebb7b05

    • SHA512

      80730dd454d345b8e1fb86aa227697d6fd62ad9eb835955bfce66622ecc47f1f31e0446554aae7db8502f555dda35a9bbe0d64d7a6523d72575a29ed6fe5ffd4

    • SSDEEP

      24576:e845rGHu6gVJKG75oFpA0VWeX4h2y1q2rJp0:745vRVJKGtSA0VWeo4u9p0

    • MrBlack Trojan

      IoT botnet which infects routers to be used for DDoS attacks.

    • MrBlack trojan

    • Executes dropped EXE

    • Checks CPU configuration

      Checks CPU information which indicate if the system is a virtual machine.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Write file to user bin folder

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks