General

  • Target

    c67271b0f7ffbc565f7d7ccbee12cbab

  • Size

    1.1MB

  • Sample

    231222-rxk4qseac9

  • MD5

    c67271b0f7ffbc565f7d7ccbee12cbab

  • SHA1

    2a4650b048edfec4a508fe758c3adc7e231bc4e9

  • SHA256

    4d5ffa44be5a98eb77b2efd1d30d5577d4fd7439e7976cf0840a81b82f5971aa

  • SHA512

    7269ace3b783a72e899bfa30b6bf95622cc8e594c4ba2cb24b875be230f15ff33c3ebbddbff49a0812bfbb33594039b4951f577f45b58a94d914a8421ac3886c

  • SSDEEP

    24576:4vRE7caCfKGPqVEDNLFxKsfavI+gIGYuuCol7r:4vREKfPqVE5jKsfavRHGVo7r

Malware Config

Targets

    • Target

      c67271b0f7ffbc565f7d7ccbee12cbab

    • Size

      1.1MB

    • MD5

      c67271b0f7ffbc565f7d7ccbee12cbab

    • SHA1

      2a4650b048edfec4a508fe758c3adc7e231bc4e9

    • SHA256

      4d5ffa44be5a98eb77b2efd1d30d5577d4fd7439e7976cf0840a81b82f5971aa

    • SHA512

      7269ace3b783a72e899bfa30b6bf95622cc8e594c4ba2cb24b875be230f15ff33c3ebbddbff49a0812bfbb33594039b4951f577f45b58a94d914a8421ac3886c

    • SSDEEP

      24576:4vRE7caCfKGPqVEDNLFxKsfavI+gIGYuuCol7r:4vREKfPqVE5jKsfavRHGVo7r

    • MrBlack Trojan

      IoT botnet which infects routers to be used for DDoS attacks.

    • MrBlack trojan

    • Executes dropped EXE

    • Checks CPU configuration

      Checks CPU information which indicate if the system is a virtual machine.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Write file to user bin folder

    • Writes file to system bin folder

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Hijack Execution Flow

2
T1574

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Hijack Execution Flow

2
T1574

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Hijack Execution Flow

2
T1574

Discovery

Virtualization/Sandbox Evasion

1
T1497

System Network Configuration Discovery

2
T1016

Tasks