General

  • Target

    a2105c014f86694e960aaedf4bbf1099

  • Size

    1.2MB

  • Sample

    231222-qn5lcabae5

  • MD5

    a2105c014f86694e960aaedf4bbf1099

  • SHA1

    9b849dfe7c49eb874e0c4e76f22fc4e1c75fbb57

  • SHA256

    4787faba7acba522e95fdb65a1312b98a1f167141fa9668e180886c30cb27f54

  • SHA512

    d52474dcdf0e187668b84d60d8cf80471fe56ce624d266f4f436274be9eca4c7b5107b798827bf7e3b82d48a579c0cb49731864237131af3f84ba6cf0baebeb8

  • SSDEEP

    24576:e845rGHu6gVJKG75oFpA0VWeX402y1q2rJp0:745vRVJKGtSA0VWeobu9p0

Malware Config

Targets

    • Target

      a2105c014f86694e960aaedf4bbf1099

    • Size

      1.2MB

    • MD5

      a2105c014f86694e960aaedf4bbf1099

    • SHA1

      9b849dfe7c49eb874e0c4e76f22fc4e1c75fbb57

    • SHA256

      4787faba7acba522e95fdb65a1312b98a1f167141fa9668e180886c30cb27f54

    • SHA512

      d52474dcdf0e187668b84d60d8cf80471fe56ce624d266f4f436274be9eca4c7b5107b798827bf7e3b82d48a579c0cb49731864237131af3f84ba6cf0baebeb8

    • SSDEEP

      24576:e845rGHu6gVJKG75oFpA0VWeX402y1q2rJp0:745vRVJKGtSA0VWeobu9p0

    • MrBlack Trojan

      IoT botnet which infects routers to be used for DDoS attacks.

    • MrBlack trojan

    • Executes dropped EXE

    • Checks CPU configuration

      Checks CPU information which indicate if the system is a virtual machine.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Write file to user bin folder

    • Writes file to system bin folder

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Hijack Execution Flow

2
T1574

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Hijack Execution Flow

2
T1574

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Hijack Execution Flow

2
T1574

Discovery

Virtualization/Sandbox Evasion

1
T1497

System Network Configuration Discovery

2
T1016

Tasks