General

  • Target

    c67271b0f7ffbc565f7d7ccbee12cbab_JaffaCakes118

  • Size

    1.1MB

  • Sample

    240828-jltbza1hrp

  • MD5

    c67271b0f7ffbc565f7d7ccbee12cbab

  • SHA1

    2a4650b048edfec4a508fe758c3adc7e231bc4e9

  • SHA256

    4d5ffa44be5a98eb77b2efd1d30d5577d4fd7439e7976cf0840a81b82f5971aa

  • SHA512

    7269ace3b783a72e899bfa30b6bf95622cc8e594c4ba2cb24b875be230f15ff33c3ebbddbff49a0812bfbb33594039b4951f577f45b58a94d914a8421ac3886c

  • SSDEEP

    24576:4vRE7caCfKGPqVEDNLFxKsfavI+gIGYuuCol7r:4vREKfPqVE5jKsfavRHGVo7r

Malware Config

Targets

    • Target

      c67271b0f7ffbc565f7d7ccbee12cbab_JaffaCakes118

    • Size

      1.1MB

    • MD5

      c67271b0f7ffbc565f7d7ccbee12cbab

    • SHA1

      2a4650b048edfec4a508fe758c3adc7e231bc4e9

    • SHA256

      4d5ffa44be5a98eb77b2efd1d30d5577d4fd7439e7976cf0840a81b82f5971aa

    • SHA512

      7269ace3b783a72e899bfa30b6bf95622cc8e594c4ba2cb24b875be230f15ff33c3ebbddbff49a0812bfbb33594039b4951f577f45b58a94d914a8421ac3886c

    • SSDEEP

      24576:4vRE7caCfKGPqVEDNLFxKsfavI+gIGYuuCol7r:4vREKfPqVE5jKsfavRHGVo7r

    • MrBlack Trojan

      IoT botnet which infects routers to be used for DDoS attacks.

    • MrBlack trojan

    • Executes dropped EXE

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Write file to user bin folder

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks