General

  • Target

    f17b36cfddb5242cb530ee6f62fd72ad_JaffaCakes118

  • Size

    1.1MB

  • Sample

    240415-twc3vaag84

  • MD5

    f17b36cfddb5242cb530ee6f62fd72ad

  • SHA1

    1dad9668f72f681c865d058027d0eb474f920613

  • SHA256

    a81f677c5e70b1031e5faddd50ba3492e6d536ce672fa17c173f916b88e45d46

  • SHA512

    c0edc007a5030e95cc63467e5de00ba3152f3150dc9247850553fbf0542e2c6bf59543d6cca1e38dd8fdc490a2984d515a6d984e6d8833e64c90e07383d7fa16

  • SSDEEP

    24576:4vRE7caCfKGPqVEDNLFxKsfamI+gIGYuuCol7r:4vREKfPqVE5jKsfamRHGVo7r

Malware Config

Targets

    • Target

      f17b36cfddb5242cb530ee6f62fd72ad_JaffaCakes118

    • Size

      1.1MB

    • MD5

      f17b36cfddb5242cb530ee6f62fd72ad

    • SHA1

      1dad9668f72f681c865d058027d0eb474f920613

    • SHA256

      a81f677c5e70b1031e5faddd50ba3492e6d536ce672fa17c173f916b88e45d46

    • SHA512

      c0edc007a5030e95cc63467e5de00ba3152f3150dc9247850553fbf0542e2c6bf59543d6cca1e38dd8fdc490a2984d515a6d984e6d8833e64c90e07383d7fa16

    • SSDEEP

      24576:4vRE7caCfKGPqVEDNLFxKsfamI+gIGYuuCol7r:4vREKfPqVE5jKsfamRHGVo7r

    • MrBlack Trojan

      IoT botnet which infects routers to be used for DDoS attacks.

    • MrBlack trojan

    • Executes dropped EXE

    • Checks CPU configuration

      Checks CPU information which indicate if the system is a virtual machine.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Write file to user bin folder

    • Writes file to system bin folder

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Hijack Execution Flow

2
T1574

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Hijack Execution Flow

2
T1574

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Hijack Execution Flow

2
T1574

Discovery

Virtualization/Sandbox Evasion

1
T1497

System Network Configuration Discovery

1
T1016

Tasks