General

  • Target

    9df1353dbf715d5c4f580549d520fc5a_JaffaCakes118

  • Size

    1.1MB

  • Sample

    240816-l549payelg

  • MD5

    9df1353dbf715d5c4f580549d520fc5a

  • SHA1

    55df8257d85a8db943d20e6753b02e53b557b9e8

  • SHA256

    8cf917f730b3432a1d238a44943f520142f52ac07494460aec3008a7e954dfbb

  • SHA512

    7ed70bb6e6f04527ea73f50754356d57656209047eaae4c3f5290bb81c0a0654d1feb09f1971704eed41b074bb214c10d2407094d0e266256d70f6e418b39e15

  • SSDEEP

    24576:4vRE7caCfKGPqVEDNLFxKsfaGI+gIGYuuCol7r:4vREKfPqVE5jKsfaGRHGVo7r

Malware Config

Targets

    • Target

      9df1353dbf715d5c4f580549d520fc5a_JaffaCakes118

    • Size

      1.1MB

    • MD5

      9df1353dbf715d5c4f580549d520fc5a

    • SHA1

      55df8257d85a8db943d20e6753b02e53b557b9e8

    • SHA256

      8cf917f730b3432a1d238a44943f520142f52ac07494460aec3008a7e954dfbb

    • SHA512

      7ed70bb6e6f04527ea73f50754356d57656209047eaae4c3f5290bb81c0a0654d1feb09f1971704eed41b074bb214c10d2407094d0e266256d70f6e418b39e15

    • SSDEEP

      24576:4vRE7caCfKGPqVEDNLFxKsfaGI+gIGYuuCol7r:4vREKfPqVE5jKsfaGRHGVo7r

    • MrBlack Trojan

      IoT botnet which infects routers to be used for DDoS attacks.

    • MrBlack trojan

    • Executes dropped EXE

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Write file to user bin folder

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks