General

  • Target

    d29fc981913105d3ba98af225322aebd

  • Size

    1.1MB

  • Sample

    231222-sjk29ahef8

  • MD5

    d29fc981913105d3ba98af225322aebd

  • SHA1

    f115d9ccaf90bbcda643557fe657d3191d90cfdf

  • SHA256

    05191758a35557c1f23e127e9f2a24e4a49e4cc15f92d91c2690ad7680a5c181

  • SHA512

    6121b032f705e9110a11ff3db6597e1c8248e58d0601ac6bac458816b2682c0683d3e7e99754dcfdd90833decf57f5f3ab763ad4500bb01517d03eb030cb69aa

  • SSDEEP

    24576:4vRE7caCfKGPqVEDNLFxKsfatI+gIGYuuCol7r:4vREKfPqVE5jKsfatRHGVo7r

Malware Config

Targets

    • Target

      d29fc981913105d3ba98af225322aebd

    • Size

      1.1MB

    • MD5

      d29fc981913105d3ba98af225322aebd

    • SHA1

      f115d9ccaf90bbcda643557fe657d3191d90cfdf

    • SHA256

      05191758a35557c1f23e127e9f2a24e4a49e4cc15f92d91c2690ad7680a5c181

    • SHA512

      6121b032f705e9110a11ff3db6597e1c8248e58d0601ac6bac458816b2682c0683d3e7e99754dcfdd90833decf57f5f3ab763ad4500bb01517d03eb030cb69aa

    • SSDEEP

      24576:4vRE7caCfKGPqVEDNLFxKsfatI+gIGYuuCol7r:4vREKfPqVE5jKsfatRHGVo7r

    • MrBlack Trojan

      IoT botnet which infects routers to be used for DDoS attacks.

    • MrBlack trojan

    • Executes dropped EXE

    • Checks CPU configuration

      Checks CPU information which indicate if the system is a virtual machine.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Write file to user bin folder

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Hijack Execution Flow

1
T1574

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Hijack Execution Flow

1
T1574

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Hijack Execution Flow

1
T1574

Discovery

Virtualization/Sandbox Evasion

1
T1497

System Network Configuration Discovery

2
T1016

Tasks