General

  • Target

    423401f1b5c33df1591352e74570bd28_JaffaCakes118

  • Size

    1.5MB

  • Sample

    240729-m2wc2svgmk

  • MD5

    423401f1b5c33df1591352e74570bd28

  • SHA1

    a891f0b5094d05ce69aa8b66183f371ba082560d

  • SHA256

    ba527ca6d0f89299d51ad83975b87acf3f6647a205e6b5671c68b29743b387ea

  • SHA512

    b2e93a6fa4bbf7fc6fb9e8d511b5c5d3d3ad25518e5e9128f2728091c19029ec3029f2e25785af2cf390c874061d373014df869f1964f3ff720c26783bcf156f

  • SSDEEP

    49152:27ilOolLbt1laIunbZsehksS55555555555555555555555555555555555k55w1:CeOolLbt1laIunlsehYNtYi7COEm

Malware Config

Targets

    • Target

      423401f1b5c33df1591352e74570bd28_JaffaCakes118

    • Size

      1.5MB

    • MD5

      423401f1b5c33df1591352e74570bd28

    • SHA1

      a891f0b5094d05ce69aa8b66183f371ba082560d

    • SHA256

      ba527ca6d0f89299d51ad83975b87acf3f6647a205e6b5671c68b29743b387ea

    • SHA512

      b2e93a6fa4bbf7fc6fb9e8d511b5c5d3d3ad25518e5e9128f2728091c19029ec3029f2e25785af2cf390c874061d373014df869f1964f3ff720c26783bcf156f

    • SSDEEP

      49152:27ilOolLbt1laIunbZsehksS55555555555555555555555555555555555k55w1:CeOolLbt1laIunlsehYNtYi7COEm

    • MrBlack Trojan

      IoT botnet which infects routers to be used for DDoS attacks.

    • MrBlack trojan

    • Executes dropped EXE

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Write file to user bin folder

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks