General

  • Target

    7f0c9c24f2bd4145e923fe65bcdfd49c

  • Size

    1.2MB

  • Sample

    240129-gj33aabdf8

  • MD5

    7f0c9c24f2bd4145e923fe65bcdfd49c

  • SHA1

    ee482d0f762f102a86bd500c16b2586d3d20795c

  • SHA256

    7fd819ff6a69b045b0d7eb9900987dff73792a68acaa45cb0e2ef9298c5bba54

  • SHA512

    33a3ce0ee73f7ee07cb39955a8c29649578b4e38dbcd9d442dff725b97896bda1ba73bd816955f48c562925345c8790ec976a0b4e5a6cf1f93b2f2e91199b186

  • SSDEEP

    24576:e845rGHu6gVJKG75oFpA0VWeX462y1q2rJp0:745vRVJKGtSA0VWeo5u9p0

Malware Config

Targets

    • Target

      7f0c9c24f2bd4145e923fe65bcdfd49c

    • Size

      1.2MB

    • MD5

      7f0c9c24f2bd4145e923fe65bcdfd49c

    • SHA1

      ee482d0f762f102a86bd500c16b2586d3d20795c

    • SHA256

      7fd819ff6a69b045b0d7eb9900987dff73792a68acaa45cb0e2ef9298c5bba54

    • SHA512

      33a3ce0ee73f7ee07cb39955a8c29649578b4e38dbcd9d442dff725b97896bda1ba73bd816955f48c562925345c8790ec976a0b4e5a6cf1f93b2f2e91199b186

    • SSDEEP

      24576:e845rGHu6gVJKG75oFpA0VWeX462y1q2rJp0:745vRVJKGtSA0VWeo5u9p0

    • MrBlack Trojan

      IoT botnet which infects routers to be used for DDoS attacks.

    • MrBlack trojan

    • Executes dropped EXE

    • Checks CPU configuration

      Checks CPU information which indicate if the system is a virtual machine.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Write file to user bin folder

    • Writes file to system bin folder

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Hijack Execution Flow

2
T1574

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Hijack Execution Flow

2
T1574

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Hijack Execution Flow

2
T1574

Discovery

Virtualization/Sandbox Evasion

1
T1497

System Network Configuration Discovery

1
T1016

Tasks