General

  • Target

    a0d38111b414f4f206090fc09c775074_JaffaCakes118

  • Size

    1.2MB

  • Sample

    240612-qp417szfjr

  • MD5

    a0d38111b414f4f206090fc09c775074

  • SHA1

    7071b17e1a57e9f76d15b25e2f8859793c4490ac

  • SHA256

    07b8a624ca7328d1409144fb0a9119952ed450fe3d1af67d3263814c5a0c7d41

  • SHA512

    4fda52fd2afed08341179907f8a5e4457e2db77f29769250df7f08f602ef92eaa305f45feb114b1ae21aa47fde91749dca4d980f24a3ad9be8009c8983678eda

  • SSDEEP

    24576:e845rGHu6gVJKG75oFpA0VWeX4S2y1q2rJp0:745vRVJKGtSA0VWeohu9p0

Malware Config

Targets

    • Target

      a0d38111b414f4f206090fc09c775074_JaffaCakes118

    • Size

      1.2MB

    • MD5

      a0d38111b414f4f206090fc09c775074

    • SHA1

      7071b17e1a57e9f76d15b25e2f8859793c4490ac

    • SHA256

      07b8a624ca7328d1409144fb0a9119952ed450fe3d1af67d3263814c5a0c7d41

    • SHA512

      4fda52fd2afed08341179907f8a5e4457e2db77f29769250df7f08f602ef92eaa305f45feb114b1ae21aa47fde91749dca4d980f24a3ad9be8009c8983678eda

    • SSDEEP

      24576:e845rGHu6gVJKG75oFpA0VWeX4S2y1q2rJp0:745vRVJKGtSA0VWeohu9p0

    • MrBlack Trojan

      IoT botnet which infects routers to be used for DDoS attacks.

    • MrBlack trojan

    • Executes dropped EXE

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Write file to user bin folder

    • Writes file to system bin folder

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Hijack Execution Flow

2
T1574

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Hijack Execution Flow

2
T1574

Defense Evasion

Hijack Execution Flow

2
T1574

Virtualization/Sandbox Evasion

1
T1497

Discovery

Virtualization/Sandbox Evasion

1
T1497

System Network Configuration Discovery

1
T1016

Tasks