General

  • Target

    8ae5a4f868920a5cf7aff104aeaa1618_JaffaCakes118

  • Size

    1.2MB

  • Sample

    240811-stkjgazckc

  • MD5

    8ae5a4f868920a5cf7aff104aeaa1618

  • SHA1

    37850b674dda974ad5eab23ceb6e8db9c72093d7

  • SHA256

    6cfda4eefe97746660151bb77f91673c156701174574d6e54ff5768daad02497

  • SHA512

    e2c3faa0b5e77e66721fb5267d11a00f6a532e12df076fef4a838fa3f7adbc60bc0ab0944057ca12d20b9f1d4019792ef14ff0c4a768493e306730e28c9a26de

  • SSDEEP

    24576:e845rGHu6gVJKG75oFpA0VWeX4G2y1q2rJp0:745vRVJKGtSA0VWeoVu9p0

Malware Config

Targets

    • Target

      8ae5a4f868920a5cf7aff104aeaa1618_JaffaCakes118

    • Size

      1.2MB

    • MD5

      8ae5a4f868920a5cf7aff104aeaa1618

    • SHA1

      37850b674dda974ad5eab23ceb6e8db9c72093d7

    • SHA256

      6cfda4eefe97746660151bb77f91673c156701174574d6e54ff5768daad02497

    • SHA512

      e2c3faa0b5e77e66721fb5267d11a00f6a532e12df076fef4a838fa3f7adbc60bc0ab0944057ca12d20b9f1d4019792ef14ff0c4a768493e306730e28c9a26de

    • SSDEEP

      24576:e845rGHu6gVJKG75oFpA0VWeX4G2y1q2rJp0:745vRVJKGtSA0VWeoVu9p0

    • MrBlack Trojan

      IoT botnet which infects routers to be used for DDoS attacks.

    • MrBlack trojan

    • Executes dropped EXE

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Write file to user bin folder

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks