General
-
Target
mpsl.elf
-
Size
82KB
-
Sample
241013-mmjeyasbjd
-
MD5
beb7f613916d222f49214c67aefa8a39
-
SHA1
c665543fb68a176419e7c1e26c4abe09d78e97ca
-
SHA256
5b8f432b96a10c8abeafe66209a0dfae072d4069a091152c7562c60922e82c6f
-
SHA512
61dafc2c81950f9254ce7e29df1b3099e948b3bf49f48a399cbde783d464b3554e5bfa21476963643ea393ce47b874fcc4b00be6fef535518786f179d3b155e3
-
SSDEEP
1536:iVLymx1KRLkj752dCexuV/8UZlDwfkJ4MYfWR:iVLyIUYFezxu5VD1ec
Behavioral task
behavioral1
Sample
mpsl.elf
Resource
debian9-mipsel-20240729-en
Malware Config
Extracted
mirai
net.tiktoka.cc
Targets
-
-
Target
mpsl.elf
-
Size
82KB
-
MD5
beb7f613916d222f49214c67aefa8a39
-
SHA1
c665543fb68a176419e7c1e26c4abe09d78e97ca
-
SHA256
5b8f432b96a10c8abeafe66209a0dfae072d4069a091152c7562c60922e82c6f
-
SHA512
61dafc2c81950f9254ce7e29df1b3099e948b3bf49f48a399cbde783d464b3554e5bfa21476963643ea393ce47b874fcc4b00be6fef535518786f179d3b155e3
-
SSDEEP
1536:iVLymx1KRLkj752dCexuV/8UZlDwfkJ4MYfWR:iVLyIUYFezxu5VD1ec
Score9/10-
Contacts a large (37111) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Enumerates running processes
Discovers information about currently running processes on the system
-