General
-
Target
mpsl
-
Size
219KB
-
Sample
240828-1r5qmazell
-
MD5
78844d0272cc7bd80d2b4261f7b9533b
-
SHA1
775a3e1b128c17a18029bccc9c162781c25e72e1
-
SHA256
29a19db162f9e46ff84174d7d05c71dc5137c3e9e506eb98e4022bd0ab3a99db
-
SHA512
7f1b002cef408e1c697883a568835b361851bde68c6fbcf7d6af0bc76346db64efe5c1b520cf6a5b7306c0fd297f9e03576ef44c61a484b7934ee371a8a9391b
-
SSDEEP
3072:jhGm4O5W6x+1NAAqIluM+ulgd2pVHF00VVbK6:9GZKWI+1N/luM7lgiy0K
Malware Config
Targets
-
-
Target
mpsl
-
Size
219KB
-
MD5
78844d0272cc7bd80d2b4261f7b9533b
-
SHA1
775a3e1b128c17a18029bccc9c162781c25e72e1
-
SHA256
29a19db162f9e46ff84174d7d05c71dc5137c3e9e506eb98e4022bd0ab3a99db
-
SHA512
7f1b002cef408e1c697883a568835b361851bde68c6fbcf7d6af0bc76346db64efe5c1b520cf6a5b7306c0fd297f9e03576ef44c61a484b7934ee371a8a9391b
-
SSDEEP
3072:jhGm4O5W6x+1NAAqIluM+ulgd2pVHF00VVbK6:9GZKWI+1N/luM7lgiy0K
-
Contacts a large (219377) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Writes file to system bin folder
-