General

  • Target

    5907bf266919b00c99cebb511de2cafc

  • Size

    1.2MB

  • Sample

    231219-3anf5adcaj

  • MD5

    5907bf266919b00c99cebb511de2cafc

  • SHA1

    291b031e300086f499e1f19ae96201f85a23dd6f

  • SHA256

    ac9a1f9ad83c299ca554b7b812c1f06b77c0944b31674d2fa14a8cd9ce13276c

  • SHA512

    10dc1c6d1176fad370dfe51f48d385d1b7170b4abfe0fe3406eedf7cd45db1112871cab51d3a153c658ff23b50d92976e11a1328ae9929020180265d1bce6c9e

  • SSDEEP

    24576:e845rGHu6gVJKG75oFpA0VWeX4L2y1q2rJp0:745vRVJKGtSA0VWeo6u9p0

Malware Config

Targets

    • Target

      5907bf266919b00c99cebb511de2cafc

    • Size

      1.2MB

    • MD5

      5907bf266919b00c99cebb511de2cafc

    • SHA1

      291b031e300086f499e1f19ae96201f85a23dd6f

    • SHA256

      ac9a1f9ad83c299ca554b7b812c1f06b77c0944b31674d2fa14a8cd9ce13276c

    • SHA512

      10dc1c6d1176fad370dfe51f48d385d1b7170b4abfe0fe3406eedf7cd45db1112871cab51d3a153c658ff23b50d92976e11a1328ae9929020180265d1bce6c9e

    • SSDEEP

      24576:e845rGHu6gVJKG75oFpA0VWeX4L2y1q2rJp0:745vRVJKGtSA0VWeo6u9p0

    • MrBlack Trojan

      IoT botnet which infects routers to be used for DDoS attacks.

    • MrBlack trojan

    • Executes dropped EXE

    • Checks CPU configuration

      Checks CPU information which indicate if the system is a virtual machine.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Write file to user bin folder

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks