Resubmissions

03-02-2025 10:44

250203-ms1amsynbw 10

General

  • Target

    mpsl.elf

  • Size

    143KB

  • Sample

    250203-ms1amsynbw

  • MD5

    4871a4fa425ca13144383b20d3f11ca4

  • SHA1

    7cc0e4b2f28b9e1f405f77ec2a4b596898ea5291

  • SHA256

    0125a3bd7d487f3d81e8f206ed39d4c4e7c263bbc95359a0df55f61202f1c8c4

  • SHA512

    09d96b04b00b759cd2d378be6563162f18b11b554aeb4d740e24ea9c40d534c3a5483b7ab3e36576ae4d2a82482610e10bfa11cfb6868499b2b6c6077d5f79ff

  • SSDEEP

    1536:fG22PmByzRczRRdjsUYgywUAUlP16jqTMKtw3RvwktmWkbM+ESzLZ/ZvkLp9PKNB:ueBySvdjstGn/x+ESzLQpMcpOI8

Malware Config

Targets

    • Target

      mpsl.elf

    • Size

      143KB

    • MD5

      4871a4fa425ca13144383b20d3f11ca4

    • SHA1

      7cc0e4b2f28b9e1f405f77ec2a4b596898ea5291

    • SHA256

      0125a3bd7d487f3d81e8f206ed39d4c4e7c263bbc95359a0df55f61202f1c8c4

    • SHA512

      09d96b04b00b759cd2d378be6563162f18b11b554aeb4d740e24ea9c40d534c3a5483b7ab3e36576ae4d2a82482610e10bfa11cfb6868499b2b6c6077d5f79ff

    • SSDEEP

      1536:fG22PmByzRczRRdjsUYgywUAUlP16jqTMKtw3RvwktmWkbM+ESzLZ/ZvkLp9PKNB:ueBySvdjstGn/x+ESzLQpMcpOI8

    • Contacts a large (48653) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

MITRE ATT&CK Enterprise v15

Tasks