General

  • Target

    631d198fd67c385a222564f5e6832fd2

  • Size

    1.1MB

  • Sample

    231219-3ecv7aehhl

  • MD5

    631d198fd67c385a222564f5e6832fd2

  • SHA1

    5b55edfd0db2b2b5301acca8d5ba1b0e6fc43e23

  • SHA256

    86649bf1aab2eaeccaea440c9deac499956e496512894b401d7a379344eed2de

  • SHA512

    461eb1528e12f492bf3eeef5188cb10e990e6d421f8633aa56805d67205f48b5c43e9a1a714bcad0e1ad2f2e8c9b5e743a5ccea43710728640f19088d8f5c546

  • SSDEEP

    24576:4vRE7caCfKGPqVEDNLFxKsfayI+gIGYuuCol7r:4vREKfPqVE5jKsfayRHGVo7r

Malware Config

Targets

    • Target

      631d198fd67c385a222564f5e6832fd2

    • Size

      1.1MB

    • MD5

      631d198fd67c385a222564f5e6832fd2

    • SHA1

      5b55edfd0db2b2b5301acca8d5ba1b0e6fc43e23

    • SHA256

      86649bf1aab2eaeccaea440c9deac499956e496512894b401d7a379344eed2de

    • SHA512

      461eb1528e12f492bf3eeef5188cb10e990e6d421f8633aa56805d67205f48b5c43e9a1a714bcad0e1ad2f2e8c9b5e743a5ccea43710728640f19088d8f5c546

    • SSDEEP

      24576:4vRE7caCfKGPqVEDNLFxKsfayI+gIGYuuCol7r:4vREKfPqVE5jKsfayRHGVo7r

    • MrBlack Trojan

      IoT botnet which infects routers to be used for DDoS attacks.

    • MrBlack trojan

    • Executes dropped EXE

    • Checks CPU configuration

      Checks CPU information which indicate if the system is a virtual machine.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Write file to user bin folder

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks