General
-
Target
botx.mpsl.elf
-
Size
112KB
-
Sample
240714-p8mqla1eln
-
MD5
d48061ee072c1b0ee3bc6419be877261
-
SHA1
e72a1d64bd55517b109a52e352998d8c080d08ec
-
SHA256
031ddd0cee7923a197a334482422a1b893d7ea725a69281710f78a841f4bb311
-
SHA512
ae3e0827789ca8109a8d48d3aaf353deca8d9620c597faa06d4023e43d48c99b177e59b074f12fec0063dac8bd58e0d580f5511401b24a00d2dadf7f62762288
-
SSDEEP
3072:Rpn1nyJ4P3GE0Nm2zCXk/S3eggeOwcmqBemEz:Tn1nIOGE0NJxS3jgHmqBemEz
Behavioral task
behavioral1
Sample
botx.mpsl.elf
Resource
debian9-mipsel-20240611-en
Malware Config
Extracted
mirai
CONDI
report.condinet.cf
Targets
-
-
Target
botx.mpsl.elf
-
Size
112KB
-
MD5
d48061ee072c1b0ee3bc6419be877261
-
SHA1
e72a1d64bd55517b109a52e352998d8c080d08ec
-
SHA256
031ddd0cee7923a197a334482422a1b893d7ea725a69281710f78a841f4bb311
-
SHA512
ae3e0827789ca8109a8d48d3aaf353deca8d9620c597faa06d4023e43d48c99b177e59b074f12fec0063dac8bd58e0d580f5511401b24a00d2dadf7f62762288
-
SSDEEP
3072:Rpn1nyJ4P3GE0Nm2zCXk/S3eggeOwcmqBemEz:Tn1nIOGE0NJxS3jgHmqBemEz
Score9/10-
Contacts a large (54501) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Writes file to system bin folder
-