General

  • Target

    66f6ad18ff5cfcd7a89e48f68dbed442_JaffaCakes118

  • Size

    1.2MB

  • Sample

    240729-3dqewswbrp

  • MD5

    66f6ad18ff5cfcd7a89e48f68dbed442

  • SHA1

    24cf9718be7efa3559843fb2adc2d0fb3213d98c

  • SHA256

    f01aaf4b128bd54f315906c1c935db87ff0392781f2d2f7629b932d453f0f00c

  • SHA512

    af8b0426d9287ca42e81de9dd46aa5c7a4b18a87c0c58fecc909082c5ba6f237f70435d5ae1e00d65943c903f8937581579726181dfa69e845c2d38a40e3e1de

  • SSDEEP

    24576:e845rGHu6gVJKG75oFpA0VWIX4Y2y1q2rJp0:745vRVJKGtSA0VWIo/u9p0

Malware Config

Targets

    • Target

      66f6ad18ff5cfcd7a89e48f68dbed442_JaffaCakes118

    • Size

      1.2MB

    • MD5

      66f6ad18ff5cfcd7a89e48f68dbed442

    • SHA1

      24cf9718be7efa3559843fb2adc2d0fb3213d98c

    • SHA256

      f01aaf4b128bd54f315906c1c935db87ff0392781f2d2f7629b932d453f0f00c

    • SHA512

      af8b0426d9287ca42e81de9dd46aa5c7a4b18a87c0c58fecc909082c5ba6f237f70435d5ae1e00d65943c903f8937581579726181dfa69e845c2d38a40e3e1de

    • SSDEEP

      24576:e845rGHu6gVJKG75oFpA0VWIX4Y2y1q2rJp0:745vRVJKGtSA0VWIo/u9p0

    • MrBlack Trojan

      IoT botnet which infects routers to be used for DDoS attacks.

    • MrBlack trojan

    • Executes dropped EXE

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Write file to user bin folder

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks