General

  • Target

    7d1343b3ab670b162fb2ce8854f01167.bin

  • Size

    434KB

  • Sample

    240506-bzgw4ach21

  • MD5

    e6001b27689e96400db9f3dce76a6a10

  • SHA1

    6b20552b123afe97661d51f0c634f097327417d7

  • SHA256

    646279a6d09af77e39604ccefcf6021752a6572316a91047f0341f08cd8f4d45

  • SHA512

    7ecd7c881775cfd5907e84cca09b655853ad5b9cd235ca8dca5453c314f57c5489e05d1d943837bb09edc36e25f18da04e0c6378835a6aaf08ffad0eedde0260

  • SSDEEP

    12288:LUuSX0Nt4jQtnLydwoPuP2xGjOTz+AqQGSWvUDeN55:L6XJQdsHmP2gHA+YDeF

Malware Config

Targets

    • Target

      6674baf9b5ee9baf415ae92ed69b522bf1367cceb60cfd57ae7bc4b8e0677a23.elf

    • Size

      1.1MB

    • MD5

      7d1343b3ab670b162fb2ce8854f01167

    • SHA1

      de95e608dd0e97d5eca90b6b6d747465980d4857

    • SHA256

      6674baf9b5ee9baf415ae92ed69b522bf1367cceb60cfd57ae7bc4b8e0677a23

    • SHA512

      22ff942fcaabe8a63919a53bf68642dd45943ef3c24e558b18d51ca5c4c0209be653ec268f9d0f64b5634e9dd3e32f7eacdb746fd2263907c0f8f33d89dd91be

    • SSDEEP

      24576:4vRE7caCfKGPqVEDNLFxKsfawI+gIGYuuCol7r:4vREKfPqVE5jKsfawRHGVo7r

    • MrBlack Trojan

      IoT botnet which infects routers to be used for DDoS attacks.

    • MrBlack trojan

    • Executes dropped EXE

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Write file to user bin folder

    • Writes file to system bin folder

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Hijack Execution Flow

2
T1574

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Hijack Execution Flow

2
T1574

Defense Evasion

Hijack Execution Flow

2
T1574

Virtualization/Sandbox Evasion

1
T1497

Discovery

System Network Configuration Discovery

2
T1016

Virtualization/Sandbox Evasion

1
T1497

Tasks