Analysis
-
max time kernel
155s -
max time network
194s -
platform
debian-12_mipsel -
resource
debian12-mipsel-20240221-en -
resource tags
arch:mipselimage:debian12-mipsel-20240221-enkernel:6.1.0-17-4kc-maltalocale:en-usos:debian-12-mipselsystem -
submitted
24/03/2025, 11:26
Behavioral task
behavioral1
Sample
g4za.mpsl.elf
Resource
debian12-mipsel-20240221-en
General
-
Target
g4za.mpsl.elf
-
Size
106KB
-
MD5
ed2b7029eb271f664ad2d1d6cf1e35c0
-
SHA1
6cd7d31b5aa658a51ab2d67e6b2601b5dd41439f
-
SHA256
0faeb27bd79cd96a6e59f93bafc66d50552a9ae1b6150a2436b55138dcb5bff7
-
SHA512
68d5d6aad359741593ae097bc6e7245168e08a2e1268353653a2d70dcdedb1a0fd393ada7874f53453acf7eb7d84335efc1c7ad2a75dbf57854b32f7916ca3bf
-
SSDEEP
1536:sAcC99ax1OOEEX8DZnMiNj7GYoGmFPCQvGgscOYgtZ8Tm:sZC99axQObKMiBdgscO9om
Malware Config
Signatures
-
Contacts a large (120580) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog g4za.mpsl.elf File opened for modification /dev/misc/watchdog g4za.mpsl.elf -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp g4za.mpsl.elf -
Reads process memory 1 TTPs 22 IoCs
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
description ioc Process File opened for reading /proc/696/maps g4za.mpsl.elf File opened for reading /proc/750/maps g4za.mpsl.elf File opened for reading /proc/550/maps g4za.mpsl.elf File opened for reading /proc/727/maps g4za.mpsl.elf File opened for reading /proc/729/maps g4za.mpsl.elf File opened for reading /proc/760/maps g4za.mpsl.elf File opened for reading /proc/541/maps g4za.mpsl.elf File opened for reading /proc/689/maps g4za.mpsl.elf File opened for reading /proc/704/maps g4za.mpsl.elf File opened for reading /proc/714/maps g4za.mpsl.elf File opened for reading /proc/717/maps g4za.mpsl.elf File opened for reading /proc/720/maps g4za.mpsl.elf File opened for reading /proc/746/maps g4za.mpsl.elf File opened for reading /proc/761/maps g4za.mpsl.elf File opened for reading /proc/427/maps g4za.mpsl.elf File opened for reading /proc/683/maps g4za.mpsl.elf File opened for reading /proc/711/maps g4za.mpsl.elf File opened for reading /proc/749/maps g4za.mpsl.elf File opened for reading /proc/762/maps g4za.mpsl.elf File opened for reading /proc/764/maps g4za.mpsl.elf File opened for reading /proc/885/maps g4za.mpsl.elf File opened for reading /proc/888/maps g4za.mpsl.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself 7cgjcmj8gi1t5tws 743 g4za.mpsl.elf -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp g4za.mpsl.elf