Analysis
-
max time kernel
137s -
max time network
172s -
platform
debian-12_mipsel -
resource
debian12-mipsel-20240418-en -
resource tags
arch:mipselimage:debian12-mipsel-20240418-enkernel:6.1.0-17-4kc-maltalocale:en-usos:debian-12-mipselsystem -
submitted
09/03/2025, 15:18
General
-
Target
apep.mpsl.elf
-
Size
34KB
-
MD5
63fa72e38f4fa5dfe9e3c6c6ee26ddee
-
SHA1
bca3b464763906b59d36719fab9e29003cd28ed0
-
SHA256
da58691be9f1b9cfd7b562b9a0598a5b3d5bbf5d0ea826decc3b81ff8a68aac2
-
SHA512
0dc93e651ce9bbf3e6caba41a73c17caf9e39ec06d8ec467c7fe8b54170a84fdbb9b43bd61247e4afbdb26e47aea15362815b6ada8ad16ff983da6264c380423
-
SSDEEP
768:S8JIfSl8+atcncdKCKUtp56BWrPS5ZSTyWM8:STfr/t3DKUYgKWV
Malware Config
Extracted
Family
mirai
Botnet
APEP
Signatures
-
Mirai family
-
Contacts a large (189596) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself zuza}jssz`qxxvgea} 740 apep.mpsl.elf -
description ioc Process File opened for reading /proc/self/exe apep.mpsl.elf -
Writes file to tmp directory 4 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/=vwd=TFEVF#"#Mesfqzv}u apep.mpsl.elf File opened for modification /tmp/=vwd=TFEVF#"#N2esfqzv}u apep.mpsl.elf File opened for modification /tmp/=vwd=esfqzv}u apep.mpsl.elf File opened for modification /tmp/=vwd={aq=esfqzv}u apep.mpsl.elf