General

  • Target

    2939aadefa42ec7ad1c03d0c6f73b9cb_JaffaCakes118

  • Size

    1.2MB

  • Sample

    240329-wt6y9aee9s

  • MD5

    2939aadefa42ec7ad1c03d0c6f73b9cb

  • SHA1

    73172c7388b4392f5ca77178a00baa50e3df9785

  • SHA256

    119da99cd938fb3eeaa4c6e824ebaa9efb36abc66aa04ab60efb7f63350018eb

  • SHA512

    939f8458854cfbdc32d7954747c95ea7a2341fda7669840e9123e18662cd95fc63f010f2a017becc51f5b817811fb7dc041597031f0d8d9a9a5c6cc28b5e3d67

  • SSDEEP

    24576:e845rGHu6gVJKG75oFpA0VWeX4S2y1q2rJp0:745vRVJKGtSA0VWeohu9p0

Malware Config

Targets

    • Target

      2939aadefa42ec7ad1c03d0c6f73b9cb_JaffaCakes118

    • Size

      1.2MB

    • MD5

      2939aadefa42ec7ad1c03d0c6f73b9cb

    • SHA1

      73172c7388b4392f5ca77178a00baa50e3df9785

    • SHA256

      119da99cd938fb3eeaa4c6e824ebaa9efb36abc66aa04ab60efb7f63350018eb

    • SHA512

      939f8458854cfbdc32d7954747c95ea7a2341fda7669840e9123e18662cd95fc63f010f2a017becc51f5b817811fb7dc041597031f0d8d9a9a5c6cc28b5e3d67

    • SSDEEP

      24576:e845rGHu6gVJKG75oFpA0VWeX4S2y1q2rJp0:745vRVJKGtSA0VWeohu9p0

    • MrBlack Trojan

      IoT botnet which infects routers to be used for DDoS attacks.

    • MrBlack trojan

    • Executes dropped EXE

    • Checks CPU configuration

      Checks CPU information which indicate if the system is a virtual machine.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Write file to user bin folder

    • Writes file to system bin folder

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Hijack Execution Flow

2
T1574

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Hijack Execution Flow

2
T1574

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Hijack Execution Flow

2
T1574

Discovery

Virtualization/Sandbox Evasion

1
T1497

System Network Configuration Discovery

2
T1016

Tasks