General

  • Target

    c1fe854c355ba80568c73575069af223

  • Size

    1.2MB

  • Sample

    231222-rsc8bscff8

  • MD5

    c1fe854c355ba80568c73575069af223

  • SHA1

    062ad21f739532f1318d619c7fbc129d1cbd49f8

  • SHA256

    20411909131602f6df050c0c2d8cf86b4d70ccdd3c36edb743d9de800b4179c8

  • SHA512

    ce2340774e564614e5e8f84bde591172ca73f0d021db601d10bba70c341be0d9bbe0c14a4eeb0fda27b82275e3cbdbe225bd5dd32f9f4e7a1014410539f23c8d

  • SSDEEP

    24576:e845rGHu6gVJKG75oFpA0VWIX4H2y1q2rJp0:745vRVJKGtSA0VWIoWu9p0

Malware Config

Targets

    • Target

      c1fe854c355ba80568c73575069af223

    • Size

      1.2MB

    • MD5

      c1fe854c355ba80568c73575069af223

    • SHA1

      062ad21f739532f1318d619c7fbc129d1cbd49f8

    • SHA256

      20411909131602f6df050c0c2d8cf86b4d70ccdd3c36edb743d9de800b4179c8

    • SHA512

      ce2340774e564614e5e8f84bde591172ca73f0d021db601d10bba70c341be0d9bbe0c14a4eeb0fda27b82275e3cbdbe225bd5dd32f9f4e7a1014410539f23c8d

    • SSDEEP

      24576:e845rGHu6gVJKG75oFpA0VWIX4H2y1q2rJp0:745vRVJKGtSA0VWIoWu9p0

    • MrBlack Trojan

      IoT botnet which infects routers to be used for DDoS attacks.

    • MrBlack trojan

    • Executes dropped EXE

    • Checks CPU configuration

      Checks CPU information which indicate if the system is a virtual machine.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Write file to user bin folder

    • Writes file to system bin folder

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Hijack Execution Flow

2
T1574

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Hijack Execution Flow

2
T1574

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Hijack Execution Flow

2
T1574

Discovery

Virtualization/Sandbox Evasion

1
T1497

System Network Configuration Discovery

2
T1016

Tasks