Analysis
-
max time kernel
27s -
max time network
154s -
platform
debian-12_mipsel -
resource
debian12-mipsel-20240729-en -
resource tags
arch:mipselimage:debian12-mipsel-20240729-enkernel:6.1.0-17-4kc-maltalocale:en-usos:debian-12-mipselsystem -
submitted
27-12-2024 06:22
Behavioral task
behavioral1
Sample
db0fa4b8db0333367e9bda3ab68b8042.mpsl.elf
Resource
debian12-mipsel-20240729-en
General
-
Target
db0fa4b8db0333367e9bda3ab68b8042.mpsl.elf
-
Size
37KB
-
MD5
085a445d18c9486c4eadb52dd1635338
-
SHA1
2a9046cd5eb1b40f16c39b9b163bb73c88ef51a2
-
SHA256
1faf599d880f8669f48ead5f9670c2b6e8c1e8e1d322101d92b6dc1fa48ecd02
-
SHA512
8d29335a11bbdbdf21b104974edef28aae82f7a37c3943fcf26b42aaf761e8761739630c496bbfcbb07757614d49f8689854e6118ca3b80d01e8385a0071b8ab
-
SSDEEP
768:aPgE2ylEEI/Is86mmG0pfakLuL5NZqy7zKtHPO+0WMY:oj2EJIAmmmG0pCkL45Ncy7wP7
Malware Config
Extracted
mirai
UNSTABLE
Signatures
-
Mirai family
-
Contacts a large (194644) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog db0fa4b8db0333367e9bda3ab68b8042.mpsl.elf File opened for modification /dev/watchdog db0fa4b8db0333367e9bda3ab68b8042.mpsl.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog db0fa4b8db0333367e9bda3ab68b8042.mpsl.elf File opened for modification /bin/watchdog db0fa4b8db0333367e9bda3ab68b8042.mpsl.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself a 744 db0fa4b8db0333367e9bda3ab68b8042.mpsl.elf -
description ioc Process File opened for reading /proc/751/cmdline db0fa4b8db0333367e9bda3ab68b8042.mpsl.elf File opened for reading /proc/664/cmdline db0fa4b8db0333367e9bda3ab68b8042.mpsl.elf File opened for reading /proc/723/cmdline db0fa4b8db0333367e9bda3ab68b8042.mpsl.elf File opened for reading /proc/749/cmdline db0fa4b8db0333367e9bda3ab68b8042.mpsl.elf File opened for reading /proc/750/cmdline db0fa4b8db0333367e9bda3ab68b8042.mpsl.elf File opened for reading /proc/self/exe db0fa4b8db0333367e9bda3ab68b8042.mpsl.elf File opened for reading /proc/679/cmdline db0fa4b8db0333367e9bda3ab68b8042.mpsl.elf File opened for reading /proc/682/cmdline db0fa4b8db0333367e9bda3ab68b8042.mpsl.elf File opened for reading /proc/735/cmdline db0fa4b8db0333367e9bda3ab68b8042.mpsl.elf File opened for reading /proc/439/cmdline db0fa4b8db0333367e9bda3ab68b8042.mpsl.elf File opened for reading /proc/681/cmdline db0fa4b8db0333367e9bda3ab68b8042.mpsl.elf File opened for reading /proc/719/cmdline db0fa4b8db0333367e9bda3ab68b8042.mpsl.elf File opened for reading /proc/748/cmdline db0fa4b8db0333367e9bda3ab68b8042.mpsl.elf File opened for reading /proc/757/cmdline db0fa4b8db0333367e9bda3ab68b8042.mpsl.elf File opened for reading /proc/697/cmdline db0fa4b8db0333367e9bda3ab68b8042.mpsl.elf File opened for reading /proc/700/cmdline db0fa4b8db0333367e9bda3ab68b8042.mpsl.elf File opened for reading /proc/712/cmdline db0fa4b8db0333367e9bda3ab68b8042.mpsl.elf File opened for reading /proc/734/cmdline db0fa4b8db0333367e9bda3ab68b8042.mpsl.elf