General

  • Target

    apep.mpsl.elf

  • Size

    98KB

  • Sample

    250309-naxmgazqy4

  • MD5

    70c6aaa00434d18777e07be1c65f8b38

  • SHA1

    69da72df926aa5b2c6da9ba533243f9c0ac23a52

  • SHA256

    aa829755451bebdd7aa7324f1fa17cff8b39d5198b01844cadcf332ea0de0a1d

  • SHA512

    8baa40d13a77d61c21cc708e9d692d2b6e08cd2be1593d0b9cc22515b22789ec37136e70aa22574509f89764dea7b8816673d6d66b6c13b79603d82599d7bf96

  • SSDEEP

    1536:lIIahKVJgNKrxzP9a0hiiCNxQrU6YIMvtZ2/i4DW6pZZTp1XH2Ka:lII22gc19ZhizQrXZMUBpH

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

APEP

Targets

    • Target

      apep.mpsl.elf

    • Size

      98KB

    • MD5

      70c6aaa00434d18777e07be1c65f8b38

    • SHA1

      69da72df926aa5b2c6da9ba533243f9c0ac23a52

    • SHA256

      aa829755451bebdd7aa7324f1fa17cff8b39d5198b01844cadcf332ea0de0a1d

    • SHA512

      8baa40d13a77d61c21cc708e9d692d2b6e08cd2be1593d0b9cc22515b22789ec37136e70aa22574509f89764dea7b8816673d6d66b6c13b79603d82599d7bf96

    • SSDEEP

      1536:lIIahKVJgNKrxzP9a0hiiCNxQrU6YIMvtZ2/i4DW6pZZTp1XH2Ka:lII22gc19ZhizQrXZMUBpH

    Score
    9/10
    • Contacts a large (196012) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

MITRE ATT&CK Enterprise v15

Tasks