Analysis
-
max time kernel
141s -
max time network
154s -
platform
debian-12_mipsel -
resource
debian12-mipsel-20240221-en -
resource tags
arch:mipselimage:debian12-mipsel-20240221-enkernel:6.1.0-17-4kc-maltalocale:en-usos:debian-12-mipselsystem -
submitted
26/02/2025, 19:49
Behavioral task
behavioral1
Sample
m-p.s-l.Sakura.elf
Resource
debian12-mipsel-20240221-en
2 signatures
150 seconds
General
-
Target
m-p.s-l.Sakura.elf
-
Size
148KB
-
MD5
c1751a3301865f176d8008f3a71293cd
-
SHA1
b8d93a127dafd2dc296dc704691ecaf5d8097984
-
SHA256
ab55c918dfb95bee50423287b52909ee59e5791b820b08c22d7be6bcd6a59db1
-
SHA512
cca7fadbb7becf74f3f9b95ae5aa1df527a20fc8ebc7ee343b4639264ec581ce207a9a5ff0eccc4deb3e40494f44cb233f89764158fb7528b95a8dfcea6262ca
-
SSDEEP
1536:rryejez5tMXrpyrTpHToBA9i4ANqm/VBymv4YmPQ:rrVrsrTd7kPwmNBymgYmPQ
Score
6/10
Malware Config
Signatures
-
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/route m-p.s-l.Sakura.elf -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/route m-p.s-l.Sakura.elf