General

  • Target

    0ddda3bb8590616f803a7320d890645e_JaffaCakes118

  • Size

    1.5MB

  • Sample

    240728-hwr18axflc

  • MD5

    0ddda3bb8590616f803a7320d890645e

  • SHA1

    60d43f48772248dffd668e58ff3adc05d1dec8d5

  • SHA256

    c2995a7967fc091aa81ca0b203281e8084215ee95bbc4f70d02f334f299f1544

  • SHA512

    1c204103046189329aa694eec4beb99ed3b3c238a0607e4fb5dd64c93122a411fda5a9ae609560d17651654bf53ba042c0a14a9655efa0af9270c360f2d681c8

  • SSDEEP

    24576:GA46TrzJBisiOvhlOHdSbQmHyJgf/kgX0Exb2cyaGpIoiMdhnnLmYXqSYKKZdTrD:zRNi6OHdSbQoyJyXpxb2PaGpXiMbnLmB

Malware Config

Targets

    • Target

      0ddda3bb8590616f803a7320d890645e_JaffaCakes118

    • Size

      1.5MB

    • MD5

      0ddda3bb8590616f803a7320d890645e

    • SHA1

      60d43f48772248dffd668e58ff3adc05d1dec8d5

    • SHA256

      c2995a7967fc091aa81ca0b203281e8084215ee95bbc4f70d02f334f299f1544

    • SHA512

      1c204103046189329aa694eec4beb99ed3b3c238a0607e4fb5dd64c93122a411fda5a9ae609560d17651654bf53ba042c0a14a9655efa0af9270c360f2d681c8

    • SSDEEP

      24576:GA46TrzJBisiOvhlOHdSbQmHyJgf/kgX0Exb2cyaGpIoiMdhnnLmYXqSYKKZdTrD:zRNi6OHdSbQoyJyXpxb2PaGpXiMbnLmB

    • MrBlack Trojan

      IoT botnet which infects routers to be used for DDoS attacks.

    • MrBlack trojan

    • Executes dropped EXE

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Write file to user bin folder

    • Writes file to system bin folder

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Hijack Execution Flow

2
T1574

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Hijack Execution Flow

2
T1574

Defense Evasion

Hijack Execution Flow

2
T1574

Virtualization/Sandbox Evasion

1
T1497

Discovery

System Network Configuration Discovery

2
T1016

Virtualization/Sandbox Evasion

1
T1497

Tasks