General
-
Target
b3astmode.mpsl.elf
-
Size
24KB
-
Sample
241213-adap8atngj
-
MD5
8e2bc890571386d49be504c19d6ae5f4
-
SHA1
ec10343c39481e9867cab49607feb8351baa17dd
-
SHA256
e5baf9cce449b61fe75c5bc6ceb2c0f82d4849d0827148bd33a6a1fb8f4b98a2
-
SHA512
75b232d0f4c28b33ec01f0c27bd4e73ddb17d007b6531a63266e08f32c6a8fbe1811aa7570c874c298a117edf31c2f2e191b35d628c65eed45ad723c718db4af
-
SSDEEP
384:jFlBUkgXosS2QACmjjAEdQqJIVFlFncTXuKQW2tXveseWiQ6CJRWGVCz+uyQjV:CkWAaLjjFeFLlFnLKiGsBiQ6CHWWBQJ
Behavioral task
behavioral1
Sample
b3astmode.mpsl.elf
Resource
debian9-mipsel-20240418-en
Malware Config
Targets
-
-
Target
b3astmode.mpsl.elf
-
Size
24KB
-
MD5
8e2bc890571386d49be504c19d6ae5f4
-
SHA1
ec10343c39481e9867cab49607feb8351baa17dd
-
SHA256
e5baf9cce449b61fe75c5bc6ceb2c0f82d4849d0827148bd33a6a1fb8f4b98a2
-
SHA512
75b232d0f4c28b33ec01f0c27bd4e73ddb17d007b6531a63266e08f32c6a8fbe1811aa7570c874c298a117edf31c2f2e191b35d628c65eed45ad723c718db4af
-
SSDEEP
384:jFlBUkgXosS2QACmjjAEdQqJIVFlFncTXuKQW2tXveseWiQ6CJRWGVCz+uyQjV:CkWAaLjjFeFLlFnLKiGsBiQ6CHWWBQJ
Score10/10-
Mirai family
-
Contacts a large (69729) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-