General

  • Target

    ff3a8d23aab424bfd9db6505b77ab05d

  • Size

    1.1MB

  • Sample

    231222-vww2dsfab4

  • MD5

    ff3a8d23aab424bfd9db6505b77ab05d

  • SHA1

    3228c70108778f9cd58237141652ec4ad2b01b33

  • SHA256

    2c6351a60f83ef185be9991b8ebfc11af7c29c59572a0b2af2471b10392614d7

  • SHA512

    9dfdab046b8d9e079115ad14c1b000ee7a9df5d7e0b8a09c5d7b4f3eb88117f79652f4a5582e69b1e9e2983564253005fdd82748e03722ccbafe06799d8fe9bd

  • SSDEEP

    24576:4vRE7caCfKGPqVEDNLFxKsfawI+gIGYuuCol7r:4vREKfPqVE5jKsfawRHGVo7r

Malware Config

Targets

    • Target

      ff3a8d23aab424bfd9db6505b77ab05d

    • Size

      1.1MB

    • MD5

      ff3a8d23aab424bfd9db6505b77ab05d

    • SHA1

      3228c70108778f9cd58237141652ec4ad2b01b33

    • SHA256

      2c6351a60f83ef185be9991b8ebfc11af7c29c59572a0b2af2471b10392614d7

    • SHA512

      9dfdab046b8d9e079115ad14c1b000ee7a9df5d7e0b8a09c5d7b4f3eb88117f79652f4a5582e69b1e9e2983564253005fdd82748e03722ccbafe06799d8fe9bd

    • SSDEEP

      24576:4vRE7caCfKGPqVEDNLFxKsfawI+gIGYuuCol7r:4vREKfPqVE5jKsfawRHGVo7r

    • MrBlack Trojan

      IoT botnet which infects routers to be used for DDoS attacks.

    • MrBlack trojan

    • Executes dropped EXE

    • Checks CPU configuration

      Checks CPU information which indicate if the system is a virtual machine.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Write file to user bin folder

    • Writes file to system bin folder

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Hijack Execution Flow

2
T1574

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Hijack Execution Flow

2
T1574

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Hijack Execution Flow

2
T1574

Discovery

Virtualization/Sandbox Evasion

1
T1497

System Network Configuration Discovery

1
T1016

Tasks