General

  • Target

    mpsl.elf

  • Size

    82KB

  • Sample

    241120-y7yadatbpr

  • MD5

    12cb9cc42d7cfc9879eddcc993cbd74f

  • SHA1

    5e6536a5e9831b3f98dc288f8b23ea2a51f70298

  • SHA256

    73619cd5815691c451e16add0c9b07df3cdcc85e88885bcbf1f3edb88c13ce9d

  • SHA512

    08663725c21e81f4bf94c022ee7250c34733f20627fc31a2c6f52ed8401cfda047b07414230a45f3bf4aa51dd9278c08df40c463f6639db4ddca218e1115dd0c

  • SSDEEP

    1536:bBjj58pBdZfdaT8jLwBPa1xUQ/JSbkpxCZgxxn6:bBjj58pBdZfwIjLwBPaPxC/

Malware Config

Extracted

Family

mirai

Botnet

TSUNAGU

C2

aiddoscnc.aisysmddos.com

aiddoscnc2.aisysmddos.com

Targets

    • Target

      mpsl.elf

    • Size

      82KB

    • MD5

      12cb9cc42d7cfc9879eddcc993cbd74f

    • SHA1

      5e6536a5e9831b3f98dc288f8b23ea2a51f70298

    • SHA256

      73619cd5815691c451e16add0c9b07df3cdcc85e88885bcbf1f3edb88c13ce9d

    • SHA512

      08663725c21e81f4bf94c022ee7250c34733f20627fc31a2c6f52ed8401cfda047b07414230a45f3bf4aa51dd9278c08df40c463f6639db4ddca218e1115dd0c

    • SSDEEP

      1536:bBjj58pBdZfdaT8jLwBPa1xUQ/JSbkpxCZgxxn6:bBjj58pBdZfwIjLwBPaPxC/

    • Contacts a large (76757) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks