General

  • Target

    2be9dc77bc9bdd9c3c6b091a3132a65f

  • Size

    1.2MB

  • Sample

    231219-2r4n1adedk

  • MD5

    2be9dc77bc9bdd9c3c6b091a3132a65f

  • SHA1

    dd03bb0f2ed025714f17ab254441c9278e18643d

  • SHA256

    c428cf1e96baa71f12876d6df843d61d65546fef7e01f03f3bc14b34d89e5397

  • SHA512

    1372e5f12c149a96a8f91d9959e6bb74b569cf6e078769708f2a00c38c11c58bf0ebe830a2c3bf83ded35df0e166c50133d2b2bf275495b2934537972afde25c

  • SSDEEP

    24576:e845rGHu6gVJKG75oFpA0VWeX462y1q2rJp0:745vRVJKGtSA0VWeo5u9p0

Malware Config

Targets

    • Target

      2be9dc77bc9bdd9c3c6b091a3132a65f

    • Size

      1.2MB

    • MD5

      2be9dc77bc9bdd9c3c6b091a3132a65f

    • SHA1

      dd03bb0f2ed025714f17ab254441c9278e18643d

    • SHA256

      c428cf1e96baa71f12876d6df843d61d65546fef7e01f03f3bc14b34d89e5397

    • SHA512

      1372e5f12c149a96a8f91d9959e6bb74b569cf6e078769708f2a00c38c11c58bf0ebe830a2c3bf83ded35df0e166c50133d2b2bf275495b2934537972afde25c

    • SSDEEP

      24576:e845rGHu6gVJKG75oFpA0VWeX462y1q2rJp0:745vRVJKGtSA0VWeo5u9p0

    • MrBlack Trojan

      IoT botnet which infects routers to be used for DDoS attacks.

    • MrBlack trojan

    • Executes dropped EXE

    • Checks CPU configuration

      Checks CPU information which indicate if the system is a virtual machine.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Write file to user bin folder

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks