Analysis

  • max time kernel
    22s
  • max time network
    27s
  • platform
    debian-12_mipsel
  • resource
    debian12-mipsel-20240221-en
  • resource tags

    arch:mipselimage:debian12-mipsel-20240221-enkernel:6.1.0-17-4kc-maltalocale:en-usos:debian-12-mipselsystem
  • submitted
    28/03/2025, 05:51

General

  • Target

    bimbo-mpsl

  • Size

    62KB

  • MD5

    b458fa874710a8897b8e9f3acbf82289

  • SHA1

    093088b3c0d688d5f860fa901bc50117504163c9

  • SHA256

    1f8b24c785052d834d9237727b55d1d2446437dd4e17339995ffefb862e38668

  • SHA512

    8e666fa5e0d210041e69cf654c80e1e2a189470a25868774ac9c496206ac99d15ff68ffcdba131915ccddc19f8ae1852a04c87b49c8e2edd97c69218f726e058

  • SSDEEP

    1536:9F7SDAb/TtZrJAYll9z4VUfSRZN54eGA4k:9F7SwXrGYlDSR

Malware Config

Signatures

  • Contacts a large (58839) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Reads process memory 1 TTPs 17 IoCs

    Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

  • Changes its process name 1 IoCs

Processes

  • /tmp/bimbo-mpsl
    /tmp/bimbo-mpsl
    1⤵
    • Reads process memory
    • Changes its process name
    PID:740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads