General

  • Target

    cb7138020531726998570aadd351bb4c_JaffaCakes118

  • Size

    1.2MB

  • Sample

    240830-xfd7razfnj

  • MD5

    cb7138020531726998570aadd351bb4c

  • SHA1

    f826f369ade3bae0da3cc911c9e2124d83ab0f6d

  • SHA256

    3c295e458b362e8e9c5e8a9eab95ec418d0d77b32ba07da4cf333d22540f3a4d

  • SHA512

    654c9514f20e48667f9306ab54f535a8230c9a90df75d9a7f89221c1c7ee7f9696d04bb56db3396cc5976f6434e613ce329cfca8e8c2fec3a2c5d97b1e0e129d

  • SSDEEP

    24576:e845rGHu6gVJKG75oFpA0VWIX4z2y1q2rJp0:745vRVJKGtSA0VWIoyu9p0

Malware Config

Targets

    • Target

      cb7138020531726998570aadd351bb4c_JaffaCakes118

    • Size

      1.2MB

    • MD5

      cb7138020531726998570aadd351bb4c

    • SHA1

      f826f369ade3bae0da3cc911c9e2124d83ab0f6d

    • SHA256

      3c295e458b362e8e9c5e8a9eab95ec418d0d77b32ba07da4cf333d22540f3a4d

    • SHA512

      654c9514f20e48667f9306ab54f535a8230c9a90df75d9a7f89221c1c7ee7f9696d04bb56db3396cc5976f6434e613ce329cfca8e8c2fec3a2c5d97b1e0e129d

    • SSDEEP

      24576:e845rGHu6gVJKG75oFpA0VWIX4z2y1q2rJp0:745vRVJKGtSA0VWIoyu9p0

    • MrBlack Trojan

      IoT botnet which infects routers to be used for DDoS attacks.

    • MrBlack trojan

    • Executes dropped EXE

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Write file to user bin folder

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks