General
-
Target
c.mpsl.elf
-
Size
62KB
-
Sample
240821-qvphps1dja
-
MD5
863f59bcb64ec264f5cf7460a34ce24e
-
SHA1
ca86ec5ca815f5597f3606cb35cb16e703a6dfd3
-
SHA256
dca5f8e062d4d48f670700606897558df2330a33e765c677de855f366d793177
-
SHA512
ecb510f8c30e9e0d9d92a5990a042687449e47d655245df52cd6cd7772e98f380f817e046283bcb11ed8a78ea61ae630ee486f2f4dc7e949323d7a6ea3324311
-
SSDEEP
1536:66miO48gKKzOqJoqxrbdWFgOgtpuGkVE27K+Voc:dNVKkTuqxrbUWv3ibW+Voc
Malware Config
Targets
-
-
Target
c.mpsl.elf
-
Size
62KB
-
MD5
863f59bcb64ec264f5cf7460a34ce24e
-
SHA1
ca86ec5ca815f5597f3606cb35cb16e703a6dfd3
-
SHA256
dca5f8e062d4d48f670700606897558df2330a33e765c677de855f366d793177
-
SHA512
ecb510f8c30e9e0d9d92a5990a042687449e47d655245df52cd6cd7772e98f380f817e046283bcb11ed8a78ea61ae630ee486f2f4dc7e949323d7a6ea3324311
-
SSDEEP
1536:66miO48gKKzOqJoqxrbdWFgOgtpuGkVE27K+Voc:dNVKkTuqxrbUWv3ibW+Voc
-
Contacts a large (248866) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Deletes itself
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Writes file to system bin folder
-