Analysis
-
max time kernel
122s -
max time network
149s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240729-en -
resource tags
arch:mipselimage:debian9-mipsel-20240729-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
11-12-2024 21:52
Behavioral task
behavioral1
Sample
mpsl.elf
Resource
debian9-mipsel-20240729-en
debian-9-mipsel
7 signatures
150 seconds
General
-
Target
mpsl.elf
-
Size
34KB
-
MD5
b8f2bf3e7c002718f12751cb02130d2e
-
SHA1
06919c90eae2564ee9ded3f343e2ec18839e411d
-
SHA256
390f79cfca6cc7660d64c22208b4f2166807e5875da1a15336a9dccff130034d
-
SHA512
adfccc7878b168cba5b9f9ce92f246bced0e15db876c28ed2f7e0ec5e344ec6652b643045ca79937de7655da4c71b77db2c778f8b8d11b196bfff156a7d16185
-
SSDEEP
768:S3rCfTIN99HBlOcTP2V6rWQozQLiJam5SzopuKZiLJmcdiarN1F/tQZWn:+UTC38GHaQo4iJam5SzopuKZiLJPJrXn
Score
10/10
Malware Config
Extracted
Family
mirai
Botnet
BOTNET
Signatures
-
Mirai family
-
Contacts a large (92441) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog mpsl.elf File opened for modification /dev/misc/watchdog mpsl.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /var/Sofia 710 mpsl.elf -
description ioc Process File opened for reading /proc/B mpsl.elf