Analysis
-
max time kernel
35s -
max time network
153s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240226-en -
resource tags
arch:mipselimage:debian9-mipsel-20240226-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
09/03/2025, 11:12
Behavioral task
behavioral1
Sample
apep.mpsl.elf
Resource
debian9-mipsel-20240226-en
4 signatures
150 seconds
General
-
Target
apep.mpsl.elf
-
Size
98KB
-
MD5
70c6aaa00434d18777e07be1c65f8b38
-
SHA1
69da72df926aa5b2c6da9ba533243f9c0ac23a52
-
SHA256
aa829755451bebdd7aa7324f1fa17cff8b39d5198b01844cadcf332ea0de0a1d
-
SHA512
8baa40d13a77d61c21cc708e9d692d2b6e08cd2be1593d0b9cc22515b22789ec37136e70aa22574509f89764dea7b8816673d6d66b6c13b79603d82599d7bf96
-
SSDEEP
1536:lIIahKVJgNKrxzP9a0hiiCNxQrU6YIMvtZ2/i4DW6pZZTp1XH2Ka:lII22gc19ZhizQrXZMUBpH
Score
9/10
Malware Config
Signatures
-
Contacts a large (196012) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself ������������������ 710 apep.mpsl.elf -
Writes file to tmp directory 4 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/Ŏ��Ŭ������۵��������� apep.mpsl.elf File opened for modification /tmp/笭�玜�������迩������� apep.mpsl.elf File opened for modification /tmp/Ŏ��ŝ�������� apep.mpsl.elf File opened for modification /tmp/笭�祡��翩������� apep.mpsl.elf