General

  • Target

    bab61d0cbd2305656550c3a70330cb35_JaffaCakes118

  • Size

    1.2MB

  • Sample

    240823-hadayasckk

  • MD5

    bab61d0cbd2305656550c3a70330cb35

  • SHA1

    b4336029e368ecd4f881b499037fd5e0a5c59b69

  • SHA256

    d0cd564544266533d95bcda3fe25b09546719dd3a312e2c3383ccfae8e2b35c6

  • SHA512

    d5bc415ce576a508442e0756930520d3c36f3e7e1893cec26c56b771cb735ad4bb8afbabf9bf7f36153e861bd1c685b8a4f23ce34edfee97f6a57aa12aa01252

  • SSDEEP

    24576:e845rGHu6gVJKG75oFpA0VWeX4X2y1q2rJp0:745vRVJKGtSA0VWeoGu9p0

Malware Config

Targets

    • Target

      bab61d0cbd2305656550c3a70330cb35_JaffaCakes118

    • Size

      1.2MB

    • MD5

      bab61d0cbd2305656550c3a70330cb35

    • SHA1

      b4336029e368ecd4f881b499037fd5e0a5c59b69

    • SHA256

      d0cd564544266533d95bcda3fe25b09546719dd3a312e2c3383ccfae8e2b35c6

    • SHA512

      d5bc415ce576a508442e0756930520d3c36f3e7e1893cec26c56b771cb735ad4bb8afbabf9bf7f36153e861bd1c685b8a4f23ce34edfee97f6a57aa12aa01252

    • SSDEEP

      24576:e845rGHu6gVJKG75oFpA0VWeX4X2y1q2rJp0:745vRVJKGtSA0VWeoGu9p0

    • MrBlack Trojan

      IoT botnet which infects routers to be used for DDoS attacks.

    • MrBlack trojan

    • Executes dropped EXE

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Write file to user bin folder

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks