General

  • Target

    b7596ec8533098af77fd3b2915f102ed3286c437140cc49ba60fbad80b466cbe

  • Size

    1.2MB

  • Sample

    240626-tjaf7avbrq

  • MD5

    a011ae821ae822bade7ef4f396dcc20c

  • SHA1

    dee10d43f35c7a8513f7e2180eada022152081be

  • SHA256

    b7596ec8533098af77fd3b2915f102ed3286c437140cc49ba60fbad80b466cbe

  • SHA512

    14e3ff9968a4201f56d9b3e14441fa4ab47e3b400bc6d7a02577828d3675aa75810963fb23b8ba718505acd7f8b762124edbb98fb42f7d7ab6c79ea58264bea5

  • SSDEEP

    24576:e845rGHu6gVJKG75oFpA0VWeX4r2y1q2rJp0:745vRVJKGtSA0VWeoau9p0

Malware Config

Targets

    • Target

      b7596ec8533098af77fd3b2915f102ed3286c437140cc49ba60fbad80b466cbe

    • Size

      1.2MB

    • MD5

      a011ae821ae822bade7ef4f396dcc20c

    • SHA1

      dee10d43f35c7a8513f7e2180eada022152081be

    • SHA256

      b7596ec8533098af77fd3b2915f102ed3286c437140cc49ba60fbad80b466cbe

    • SHA512

      14e3ff9968a4201f56d9b3e14441fa4ab47e3b400bc6d7a02577828d3675aa75810963fb23b8ba718505acd7f8b762124edbb98fb42f7d7ab6c79ea58264bea5

    • SSDEEP

      24576:e845rGHu6gVJKG75oFpA0VWeX4r2y1q2rJp0:745vRVJKGtSA0VWeoau9p0

    • MrBlack Trojan

      IoT botnet which infects routers to be used for DDoS attacks.

    • MrBlack trojan

    • Executes dropped EXE

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Write file to user bin folder

    • Writes file to system bin folder

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Hijack Execution Flow

2
T1574

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Hijack Execution Flow

2
T1574

Defense Evasion

Hijack Execution Flow

2
T1574

Virtualization/Sandbox Evasion

1
T1497

Discovery

System Network Configuration Discovery

2
T1016

Virtualization/Sandbox Evasion

1
T1497

Tasks