General

  • Target

    9377c366fd7f87270414a73b0d3ac8aa

  • Size

    1.2MB

  • Sample

    231222-p7ch8sefa8

  • MD5

    9377c366fd7f87270414a73b0d3ac8aa

  • SHA1

    cecc9d46426184a6c09609261882c1f2c842887a

  • SHA256

    3830e4df2c7df94afeac2f7ed1f4bb05ccceb1f7dea6cd26e7da1295451eedbb

  • SHA512

    2436b1c311b5f41dfb2d1d8e96be7c1d5569b8db3f051c53085ad6aa5ba3595ce04e42a7c38eedacc1c81f2e6cc8153ed519c576e53e1b55fc7c44a510b2c331

  • SSDEEP

    24576:e845rGHu6gVJKG75oFpA0VWeX4v2y1q2rJp0:745vRVJKGtSA0VWeoOu9p0

Malware Config

Targets

    • Target

      9377c366fd7f87270414a73b0d3ac8aa

    • Size

      1.2MB

    • MD5

      9377c366fd7f87270414a73b0d3ac8aa

    • SHA1

      cecc9d46426184a6c09609261882c1f2c842887a

    • SHA256

      3830e4df2c7df94afeac2f7ed1f4bb05ccceb1f7dea6cd26e7da1295451eedbb

    • SHA512

      2436b1c311b5f41dfb2d1d8e96be7c1d5569b8db3f051c53085ad6aa5ba3595ce04e42a7c38eedacc1c81f2e6cc8153ed519c576e53e1b55fc7c44a510b2c331

    • SSDEEP

      24576:e845rGHu6gVJKG75oFpA0VWeX4v2y1q2rJp0:745vRVJKGtSA0VWeoOu9p0

    • MrBlack Trojan

      IoT botnet which infects routers to be used for DDoS attacks.

    • MrBlack trojan

    • Executes dropped EXE

    • Checks CPU configuration

      Checks CPU information which indicate if the system is a virtual machine.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Write file to user bin folder

    • Writes file to system bin folder

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Hijack Execution Flow

2
T1574

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Hijack Execution Flow

2
T1574

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Hijack Execution Flow

2
T1574

Discovery

Virtualization/Sandbox Evasion

1
T1497

System Network Configuration Discovery

1
T1016

Tasks