Analysis
-
max time kernel
119s -
max time network
155s -
platform
debian-12_mipsel -
resource
debian12-mipsel-20240221-en -
resource tags
arch:mipselimage:debian12-mipsel-20240221-enkernel:6.1.0-17-4kc-maltalocale:en-usos:debian-12-mipselsystem -
submitted
12-12-2024 13:56
Behavioral task
behavioral1
Sample
jew.mpsl.elf
Resource
debian12-mipsel-20240221-en
debian-12-mipsel
5 signatures
150 seconds
General
-
Target
jew.mpsl.elf
-
Size
118KB
-
MD5
e9315eed08df8e616e90b23489b11425
-
SHA1
840242925b001dcdba7548e920b18ab74d5b25a1
-
SHA256
c4f1c962ab04c95bc82fbf2b3c7d3b78a902f42fb8e3c23a88559d1522cb35f6
-
SHA512
f33fdb2f8db606d50deb2b7ce64f75f6e80b29579078d7cd54db62b277a5abb06f193a8eda98e1d8ed570871be8d55279087ec3571a5ce7e14b93f4efe0dda85
-
SSDEEP
1536:3bKhLmtwdR2B3aUerZxUKvuNxmVHg1X187ji0z4LoomBeRzsmgexbDrIA/8ElJdw:qZxUcuNxmVHyFkjbz4gWBZ
Score
9/10
Malware Config
Signatures
-
Contacts a large (96625) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog jew.mpsl.elf File opened for modification /dev/misc/watchdog jew.mpsl.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog jew.mpsl.elf File opened for modification /bin/watchdog jew.mpsl.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself kxagDsBmkyCfqubt,: 747 jew.mpsl.elf