General
-
Target
jew.mpsl.elf
-
Size
118KB
-
Sample
241207-epmw5svqaz
-
MD5
e763ac9455273a0ebd7773d550965150
-
SHA1
0b454e4cd734b07ee063c863fe44835653338f35
-
SHA256
4e566bbc9fba17867653b24298e8258311d7ac6f089b28029886e75ed6985594
-
SHA512
7e545ca2faf134e6a5841060791d9bd0a8bffcb3a1d1c056f6b62ac7ad0fb87aff3781ca628e4678fd7d55040d31b186c572270a5509efd9f081e44702c878b1
-
SSDEEP
1536:3bKhLmtwdR2B3aUerZxUKvuNxmVHg1X187ji7z4LoomBeRzsmgexbDrIA/8El7dw:qZxUcuNxmVHyFkjoz4gWBT
Behavioral task
behavioral1
Sample
jew.mpsl.elf
Resource
debian12-mipsel-20240418-en
Malware Config
Extracted
mirai
KURC
Targets
-
-
Target
jew.mpsl.elf
-
Size
118KB
-
MD5
e763ac9455273a0ebd7773d550965150
-
SHA1
0b454e4cd734b07ee063c863fe44835653338f35
-
SHA256
4e566bbc9fba17867653b24298e8258311d7ac6f089b28029886e75ed6985594
-
SHA512
7e545ca2faf134e6a5841060791d9bd0a8bffcb3a1d1c056f6b62ac7ad0fb87aff3781ca628e4678fd7d55040d31b186c572270a5509efd9f081e44702c878b1
-
SSDEEP
1536:3bKhLmtwdR2B3aUerZxUKvuNxmVHg1X187ji7z4LoomBeRzsmgexbDrIA/8El7dw:qZxUcuNxmVHyFkjoz4gWBT
Score9/10-
Contacts a large (114208) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Writes file to system bin folder
-