General

  • Target

    d5e40f3e2d31e6c6c00d715a028db5bf

  • Size

    1.1MB

  • Sample

    231222-sne2ssaed5

  • MD5

    d5e40f3e2d31e6c6c00d715a028db5bf

  • SHA1

    3ba1bf5b985ab75bbfcd4c36ba3b4f34da2c4179

  • SHA256

    9d0e5980097d18b384ccac755e546e789337be8512693ae2bbda017447974f70

  • SHA512

    660ddf2da470991da7443c284c9fe9087f3913308a3e511429c463a1a0f12bc43b661d52456fdba2695ea3498ac8d18f4bf33285d0b55bd7243b217fe1c69245

  • SSDEEP

    24576:4vRE7caCfKGPqVEDNLFxKsfaqI+gIGYuuCol7r:4vREKfPqVE5jKsfaqRHGVo7r

Malware Config

Targets

    • Target

      d5e40f3e2d31e6c6c00d715a028db5bf

    • Size

      1.1MB

    • MD5

      d5e40f3e2d31e6c6c00d715a028db5bf

    • SHA1

      3ba1bf5b985ab75bbfcd4c36ba3b4f34da2c4179

    • SHA256

      9d0e5980097d18b384ccac755e546e789337be8512693ae2bbda017447974f70

    • SHA512

      660ddf2da470991da7443c284c9fe9087f3913308a3e511429c463a1a0f12bc43b661d52456fdba2695ea3498ac8d18f4bf33285d0b55bd7243b217fe1c69245

    • SSDEEP

      24576:4vRE7caCfKGPqVEDNLFxKsfaqI+gIGYuuCol7r:4vREKfPqVE5jKsfaqRHGVo7r

    • MrBlack Trojan

      IoT botnet which infects routers to be used for DDoS attacks.

    • MrBlack trojan

    • Executes dropped EXE

    • Checks CPU configuration

      Checks CPU information which indicate if the system is a virtual machine.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Write file to user bin folder

    • Writes file to system bin folder

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Hijack Execution Flow

2
T1574

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Hijack Execution Flow

2
T1574

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Hijack Execution Flow

2
T1574

Discovery

Virtualization/Sandbox Evasion

1
T1497

System Network Configuration Discovery

1
T1016

Tasks