Analysis
-
max time kernel
152s -
max time network
158s -
platform
debian-12_mipsel -
resource
debian12-mipsel-20240418-en -
resource tags
arch:mipselimage:debian12-mipsel-20240418-enkernel:6.1.0-17-4kc-maltalocale:en-usos:debian-12-mipselsystem -
submitted
07/12/2024, 04:07
Behavioral task
behavioral1
Sample
jew.mpsl.elf
Resource
debian12-mipsel-20240418-en
5 signatures
150 seconds
General
-
Target
jew.mpsl.elf
-
Size
118KB
-
MD5
e763ac9455273a0ebd7773d550965150
-
SHA1
0b454e4cd734b07ee063c863fe44835653338f35
-
SHA256
4e566bbc9fba17867653b24298e8258311d7ac6f089b28029886e75ed6985594
-
SHA512
7e545ca2faf134e6a5841060791d9bd0a8bffcb3a1d1c056f6b62ac7ad0fb87aff3781ca628e4678fd7d55040d31b186c572270a5509efd9f081e44702c878b1
-
SSDEEP
1536:3bKhLmtwdR2B3aUerZxUKvuNxmVHg1X187ji7z4LoomBeRzsmgexbDrIA/8El7dw:qZxUcuNxmVHyFkjoz4gWBT
Score
9/10
Malware Config
Signatures
-
Contacts a large (114208) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog jew.mpsl.elf File opened for modification /dev/misc/watchdog jew.mpsl.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog jew.mpsl.elf File opened for modification /bin/watchdog jew.mpsl.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself nsmplbupijBkuBsw&'5 745 jew.mpsl.elf