General

  • Target

    e1dc8adf1bf1ebceb2b95c5d4fa02232

  • Size

    1.1MB

  • Sample

    231222-s9qqeseab7

  • MD5

    e1dc8adf1bf1ebceb2b95c5d4fa02232

  • SHA1

    496972d3b4f446ebbce8b3743f3546f14c5fd6cd

  • SHA256

    89681a305db16332df54709f9adcdf6e95561b658ba4f6a3da2a1026312fb2be

  • SHA512

    bd77d2d38725f5eeee3e7df4ee8556e58c785ef99ad728a9928bac1d4dc6d72c0c0d6dc684dcafaf7bc6fadede268d271125c1b06ad2fd6ad75928248a80490d

  • SSDEEP

    24576:4vRE7caCfKGPqVEDNLFxKsfaoI+gIGYuuCol7r:4vREKfPqVE5jKsfaoRHGVo7r

Malware Config

Targets

    • Target

      e1dc8adf1bf1ebceb2b95c5d4fa02232

    • Size

      1.1MB

    • MD5

      e1dc8adf1bf1ebceb2b95c5d4fa02232

    • SHA1

      496972d3b4f446ebbce8b3743f3546f14c5fd6cd

    • SHA256

      89681a305db16332df54709f9adcdf6e95561b658ba4f6a3da2a1026312fb2be

    • SHA512

      bd77d2d38725f5eeee3e7df4ee8556e58c785ef99ad728a9928bac1d4dc6d72c0c0d6dc684dcafaf7bc6fadede268d271125c1b06ad2fd6ad75928248a80490d

    • SSDEEP

      24576:4vRE7caCfKGPqVEDNLFxKsfaoI+gIGYuuCol7r:4vREKfPqVE5jKsfaoRHGVo7r

    • MrBlack Trojan

      IoT botnet which infects routers to be used for DDoS attacks.

    • MrBlack trojan

    • Executes dropped EXE

    • Checks CPU configuration

      Checks CPU information which indicate if the system is a virtual machine.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Write file to user bin folder

    • Writes file to system bin folder

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Hijack Execution Flow

2
T1574

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Hijack Execution Flow

2
T1574

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Hijack Execution Flow

2
T1574

Discovery

Virtualization/Sandbox Evasion

1
T1497

System Network Configuration Discovery

2
T1016

Tasks