General

  • Target

    mpsl.elf

  • Size

    82KB

  • Sample

    241013-mmjeyasbjd

  • MD5

    beb7f613916d222f49214c67aefa8a39

  • SHA1

    c665543fb68a176419e7c1e26c4abe09d78e97ca

  • SHA256

    5b8f432b96a10c8abeafe66209a0dfae072d4069a091152c7562c60922e82c6f

  • SHA512

    61dafc2c81950f9254ce7e29df1b3099e948b3bf49f48a399cbde783d464b3554e5bfa21476963643ea393ce47b874fcc4b00be6fef535518786f179d3b155e3

  • SSDEEP

    1536:iVLymx1KRLkj752dCexuV/8UZlDwfkJ4MYfWR:iVLyIUYFezxu5VD1ec

Malware Config

Extracted

Family

mirai

C2

net.tiktoka.cc

Targets

    • Target

      mpsl.elf

    • Size

      82KB

    • MD5

      beb7f613916d222f49214c67aefa8a39

    • SHA1

      c665543fb68a176419e7c1e26c4abe09d78e97ca

    • SHA256

      5b8f432b96a10c8abeafe66209a0dfae072d4069a091152c7562c60922e82c6f

    • SHA512

      61dafc2c81950f9254ce7e29df1b3099e948b3bf49f48a399cbde783d464b3554e5bfa21476963643ea393ce47b874fcc4b00be6fef535518786f179d3b155e3

    • SSDEEP

      1536:iVLymx1KRLkj752dCexuV/8UZlDwfkJ4MYfWR:iVLyIUYFezxu5VD1ec

    • Contacts a large (37111) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks