Analysis
-
max time kernel
150s -
max time network
154s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240226-en -
resource tags
arch:mipselimage:debian9-mipsel-20240226-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
09/03/2025, 15:22
Behavioral task
behavioral1
Sample
apep.mpsl.elf
Resource
debian9-mipsel-20240226-en
4 signatures
150 seconds
General
-
Target
apep.mpsl.elf
-
Size
98KB
-
MD5
cc5a2bd82cf3c8a7b93186ea2cdce611
-
SHA1
8bbc65dd7a7ec2ddeb38b107ebffd546bc6a3e25
-
SHA256
3287a857721a6fb3555808c06f9e914cafe03318a1aaa8ba5e1371ec9c2a9842
-
SHA512
32de9ea397406998e31b6a140649cbe32d4dbe2599d9eed5f64c09b5878f67f8dd7206c3e554f1d0d6f6eb17f2fe8342205f87b4413eee6c82a6b3ad2295c29b
-
SSDEEP
1536:e7SZCth8AC6Zb+ICtDPajcQgNXtbtAReXqgHPrkZZnMDNXH2Rt0:e72mqARsI4DPDQgdBjzkIF
Score
9/10
Malware Config
Signatures
-
Contacts a large (146352) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself |~davugjd`z}cw}x}d 706 apep.mpsl.elf -
Writes file to tmp directory 4 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/=vwd=esfqzv}u apep.mpsl.elf File opened for modification /tmp/=vwd={aq=esfqzv}u apep.mpsl.elf File opened for modification /tmp/=vwd=TFEVF#"#Mesfqzv}u apep.mpsl.elf File opened for modification /tmp/=vwd=TFEVF#"#N2esfqzv}u apep.mpsl.elf