Analysis

  • max time kernel
    137s
  • max time network
    172s
  • platform
    debian-12_mipsel
  • resource
    debian12-mipsel-20240418-en
  • resource tags

    arch:mipselimage:debian12-mipsel-20240418-enkernel:6.1.0-17-4kc-maltalocale:en-usos:debian-12-mipselsystem
  • submitted
    09/03/2025, 15:18

General

  • Target

    apep.mpsl.elf

  • Size

    34KB

  • MD5

    63fa72e38f4fa5dfe9e3c6c6ee26ddee

  • SHA1

    bca3b464763906b59d36719fab9e29003cd28ed0

  • SHA256

    da58691be9f1b9cfd7b562b9a0598a5b3d5bbf5d0ea826decc3b81ff8a68aac2

  • SHA512

    0dc93e651ce9bbf3e6caba41a73c17caf9e39ec06d8ec467c7fe8b54170a84fdbb9b43bd61247e4afbdb26e47aea15362815b6ada8ad16ff983da6264c380423

  • SSDEEP

    768:S8JIfSl8+atcncdKCKUtp56BWrPS5ZSTyWM8:STfr/t3DKUYgKWV

Malware Config

Extracted

Family

mirai

Botnet

APEP

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Contacts a large (189596) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Changes its process name 1 IoCs
  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 4 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/apep.mpsl.elf
    /tmp/apep.mpsl.elf
    1⤵
    • Changes its process name
    • Reads runtime system information
    • Writes file to tmp directory
    PID:740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads