Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
mpsl.elf

Overview

General Information

Sample name:mpsl.elf
Analysis ID:1584131
MD5:7f23defa1578bd5262829c6b8a799cff
SHA1:1926a2f8d2e3f6738032b9183e01f31af06da87c
SHA256:a1b50afacba8e00c6abc4b505d3b2d5c1c4de441892b4438cde0759ddfc029ef
Tags:elfuser-abuse_ch
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Found strings indicative of a multi-platform dropper
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1584131
Start date and time:2025-01-04 12:52:05 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 29s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:mpsl.elf
Detection:MAL
Classification:mal48.linELF@0/0@0/0
Command:/tmp/mpsl.elf
PID:6224
Exit Code:2
Exit Code Info:
Killed:False
Standard Output:

Standard Error:fatal error: sigaction failed

runtime stack:
runtime.throw({0x414196, 0x10})
C:/Program Files/Go/src/runtime/panic.go:1077 +0x54 fp=0x7ffffce4 sp=0x7ffffcd0 pc=0x5994c
runtime.sysSigaction.func1()
C:/Program Files/Go/src/runtime/os_linux.go:560 +0x4c fp=0x7ffffcf0 sp=0x7ffffce4 pc=0x93044
runtime.sysSigaction(0x41, 0x7ffffd18, 0x0)
C:/Program Files/Go/src/runtime/os_linux.go:559 +0x7c fp=0x7ffffd08 sp=0x7ffffcf0 pc=0x55f1c
runtime.sigaction(...)
C:/Program Files/Go/src/runtime/sigaction.go:15
runtime.setsig(0x41, 0x77fe0)
C:/Program Files/Go/src/runtime/os_linux.go:507 +0xbc fp=0x7ffffd34 sp=0x7ffffd08 pc=0x55de8
runtime.initsig(0x0)
C:/Program Files/Go/src/runtime/signal_unix.go:148 +0x2c0 fp=0x7ffffd70 sp=0x7ffffd34 pc=0x776fc
runtime.mstartm0()
C:/Program Files/Go/src/runtime/proc.go:1624 +0x70 fp=0x7ffffd78 sp=0x7ffffd70 pc=0x615d0
runtime.mstart1()
C:/Program Files/Go/src/runtime/proc.go:1596 +0x94 fp=0x7ffffd88 sp=0x7ffffd78 pc=0x614c8
runtime.mstart0()
C:/Program Files/Go/src/runtime/proc.go:1557 +0x7c fp=0x7ffffd9c sp=0x7ffffd88 pc=0x61414
runtime.mstart()
C:/Program Files/Go/src/runtime/asm_mipsx.s:89 +0x14 fp=0x7ffffda0 sp=0x7ffffd9c pc=0x9ab44

goroutine 1 [runnable]:
runtime.main()
C:/Program Files/Go/src/runtime/proc.go:144 fp=0x8287ec sp=0x8287ec pc=0x5d52c
runtime.goexit()
C:/Program Files/Go/src/runtime/asm_mipsx.s:641 +0x4 fp=0x8287ec sp=0x8287ec pc=0x9cf78
  • system is lnxubuntu20
  • mpsl.elf (PID: 6224, Parent: 6141, MD5: 0d6f61f82cf2f781c6eb0661071d42d9) Arguments: /tmp/mpsl.elf
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: mpsl.elfReversingLabs: Detection: 18%
Source: mpsl.elfString: x509: invalid signature: parent certificate cannot sign this kind of certificatecrypto/ecdh: internal error: nistec ScalarBaseMult failed for a fixed-size inputrefusing to use HTTP_PROXY value in CGI environment; see golang.org/s/cgihttpproxyx509: a root or intermediate certificate is not authorized to sign for this name: json: invalid use of ,string struct tag, trying to unmarshal unquoted value into %vx509: issuer has name constraints but leaf contains unknown or unconstrained name: (possibly because of %q while trying to verify candidate authority certificate %q)tls: downgrade attempt detected, possibly due to a MitM attack or a broken middleboxx509: signature algorithm specifies an %s public key, but have public key of type %Treflect.Value.Interface: cannot return value obtained from unexported field or methodreflect: New of type that may not be allocated in heap (possibly undefined cgo C type)x509: a root or intermediate certificate is not authorized for an extended key usage: http2: server sent GOAWAY and closed the connection; LastStreamID=%v, ErrCode=%v, debug=%qtls: handshake hash for a client certificate requested after discarding the handshake buffertls: unsupported certificate: private key is *ed25519.PrivateKey, expected ed25519.PrivateKeyb3312fa7e23ee7e4988e056be3f82d19181d9c6efe8141120314088f5013875ac656398d8a2ed19d2a85c8edd3ec2aefaa87ca22be8b05378eb1c71ef320ad746e1d3b628ba79b9859f741e082542a385502f25dbf55296c3a545e3872760ab73617de4a96262c6f5d9e98bf9292dc29f8f41dbd289a147ce9da3113b5f0b8c00a60b1ce1d7e819d7a431d7c90ea0e5fhttp: RoundTripper implementation (%T) returned a *Response with content length %d but a nil BodyNoClientCertRequestClientCertRequireAnyClientCertVerifyClientCertIfGivenRequireAndVerifyClientCertcipher: the nonce can't have zero length, or the security of the key will be immediately compromisedcgocheck > 1 mode is no longer supported at runtime. Use GOEXPERIMENT=cgocheck2 at build time instead.asn1: time did not serialize back to the original value and may be invalid: given %q, but serialized as %qhttp2: Transport: cannot retry err [%v] after Request.Body was written; define Request.GetBody to avoid this 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
Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: mpsl.elfString found in binary or memory: https://cdn.discordapp.com/AUTO_MODERATION_RULE_CREATEAUTO_MODERATION_RULE_DELETEAUTO_MODERATION_RUL
Source: mpsl.elfString found in binary or memory: https://discord.com/MESSAGE_REACTION_ADDTHREAD_MEMBER_UPDATEunmarshall
Source: mpsl.elfString found in binary or memory: https://discord.com/developers/docs/reference#authentication-example-bot-token-authorization-headerh
Source: mpsl.elfString found in binary or memory: https://github.com/20Matrix77/2FTS3/raw/main/disbot;
Source: mpsl.elfString found in binary or memory: https://github.com/bwmarrin/discordgo
Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443
Source: classification engineClassification label: mal48.linELF@0/0@0/0
Source: /tmp/mpsl.elf (PID: 6224)Queries kernel information via 'uname': Jump to behavior
Source: mpsl.elf, 6224.1.00007ffc584bd000.00007ffc584de000.rw-.sdmpBinary or memory string: Nx86_64/usr/bin/qemu-mipsel/tmp/mpsl.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/mpsl.elf
Source: mpsl.elf, 6224.1.0000557b6b4d7000.0000557b6b7de000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/mipsel
Source: mpsl.elf, 6224.1.0000557b6b4d7000.0000557b6b7de000.rw-.sdmpBinary or memory string: Nk{U!/etc/qemu-binfmt/mipsel
Source: mpsl.elf, 6224.1.00007ffc584bd000.00007ffc584de000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mipsel
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid AccountsWindows Management Instrumentation1
Scripting
Path InterceptionDirect Volume AccessOS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
mpsl.elf18%ReversingLabsLinux.Trojan.Generic
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://discord.com/MESSAGE_REACTION_ADDTHREAD_MEMBER_UPDATEunmarshallmpsl.elffalse
    high
    https://github.com/bwmarrin/discordgompsl.elffalse
      high
      https://discord.com/developers/docs/reference#authentication-example-bot-token-authorization-headerhmpsl.elffalse
        high
        https://cdn.discordapp.com/AUTO_MODERATION_RULE_CREATEAUTO_MODERATION_RULE_DELETEAUTO_MODERATION_RULmpsl.elffalse
          high
          https://github.com/20Matrix77/2FTS3/raw/main/disbot;mpsl.elffalse
            high
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            109.202.202.202
            unknownSwitzerland
            13030INIT7CHfalse
            91.189.91.43
            unknownUnited Kingdom
            41231CANONICAL-ASGBfalse
            91.189.91.42
            unknownUnited Kingdom
            41231CANONICAL-ASGBfalse
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
            • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
            91.189.91.4379.133.46.252-sora.ppc-2025-01-04T09_02_51.elfGet hashmaliciousUnknownBrowse
              Kloki.arm7.elfGet hashmaliciousMiraiBrowse
                Kloki.spc.elfGet hashmaliciousUnknownBrowse
                  Kloki.arm6.elfGet hashmaliciousMiraiBrowse
                    Fantazy.arm5.elfGet hashmaliciousUnknownBrowse
                      jefne64.elfGet hashmaliciousMiraiBrowse
                        Fantazy.arc.elfGet hashmaliciousUnknownBrowse
                          la.bot.powerpc.elfGet hashmaliciousMiraiBrowse
                            la.bot.arc.elfGet hashmaliciousMiraiBrowse
                              la.bot.m68k.elfGet hashmaliciousMiraiBrowse
                                91.189.91.4279.133.46.252-sora.ppc-2025-01-04T09_02_51.elfGet hashmaliciousUnknownBrowse
                                  Kloki.arm7.elfGet hashmaliciousMiraiBrowse
                                    Kloki.spc.elfGet hashmaliciousUnknownBrowse
                                      Kloki.arm6.elfGet hashmaliciousMiraiBrowse
                                        Fantazy.arm5.elfGet hashmaliciousUnknownBrowse
                                          jefne64.elfGet hashmaliciousMiraiBrowse
                                            Fantazy.arc.elfGet hashmaliciousUnknownBrowse
                                              la.bot.powerpc.elfGet hashmaliciousMiraiBrowse
                                                la.bot.arc.elfGet hashmaliciousMiraiBrowse
                                                  la.bot.m68k.elfGet hashmaliciousMiraiBrowse
                                                    No context
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    CANONICAL-ASGB79.133.46.252-sora.ppc-2025-01-04T09_02_51.elfGet hashmaliciousUnknownBrowse
                                                    • 91.189.91.42
                                                    Kloki.arm7.elfGet hashmaliciousMiraiBrowse
                                                    • 91.189.91.42
                                                    Kloki.spc.elfGet hashmaliciousUnknownBrowse
                                                    • 91.189.91.42
                                                    Kloki.arm6.elfGet hashmaliciousMiraiBrowse
                                                    • 91.189.91.42
                                                    Fantazy.arm5.elfGet hashmaliciousUnknownBrowse
                                                    • 91.189.91.42
                                                    jefne64.elfGet hashmaliciousMiraiBrowse
                                                    • 91.189.91.42
                                                    Fantazy.arc.elfGet hashmaliciousUnknownBrowse
                                                    • 91.189.91.42
                                                    la.bot.powerpc.elfGet hashmaliciousMiraiBrowse
                                                    • 91.189.91.42
                                                    la.bot.mipsel.elfGet hashmaliciousMiraiBrowse
                                                    • 185.125.190.26
                                                    la.bot.arc.elfGet hashmaliciousMiraiBrowse
                                                    • 91.189.91.42
                                                    CANONICAL-ASGB79.133.46.252-sora.ppc-2025-01-04T09_02_51.elfGet hashmaliciousUnknownBrowse
                                                    • 91.189.91.42
                                                    Kloki.arm7.elfGet hashmaliciousMiraiBrowse
                                                    • 91.189.91.42
                                                    Kloki.spc.elfGet hashmaliciousUnknownBrowse
                                                    • 91.189.91.42
                                                    Kloki.arm6.elfGet hashmaliciousMiraiBrowse
                                                    • 91.189.91.42
                                                    Fantazy.arm5.elfGet hashmaliciousUnknownBrowse
                                                    • 91.189.91.42
                                                    jefne64.elfGet hashmaliciousMiraiBrowse
                                                    • 91.189.91.42
                                                    Fantazy.arc.elfGet hashmaliciousUnknownBrowse
                                                    • 91.189.91.42
                                                    la.bot.powerpc.elfGet hashmaliciousMiraiBrowse
                                                    • 91.189.91.42
                                                    la.bot.mipsel.elfGet hashmaliciousMiraiBrowse
                                                    • 185.125.190.26
                                                    la.bot.arc.elfGet hashmaliciousMiraiBrowse
                                                    • 91.189.91.42
                                                    INIT7CH79.133.46.252-sora.ppc-2025-01-04T09_02_51.elfGet hashmaliciousUnknownBrowse
                                                    • 109.202.202.202
                                                    Kloki.arm7.elfGet hashmaliciousMiraiBrowse
                                                    • 109.202.202.202
                                                    Kloki.spc.elfGet hashmaliciousUnknownBrowse
                                                    • 109.202.202.202
                                                    Kloki.arm6.elfGet hashmaliciousMiraiBrowse
                                                    • 109.202.202.202
                                                    Fantazy.arm5.elfGet hashmaliciousUnknownBrowse
                                                    • 109.202.202.202
                                                    Fantazy.i486.elfGet hashmaliciousUnknownBrowse
                                                    • 77.109.170.26
                                                    jefne64.elfGet hashmaliciousMiraiBrowse
                                                    • 109.202.202.202
                                                    Fantazy.arc.elfGet hashmaliciousUnknownBrowse
                                                    • 109.202.202.202
                                                    la.bot.powerpc.elfGet hashmaliciousMiraiBrowse
                                                    • 109.202.202.202
                                                    la.bot.arc.elfGet hashmaliciousMiraiBrowse
                                                    • 109.202.202.202
                                                    No context
                                                    No context
                                                    No created / dropped files found
                                                    File type:ELF 32-bit LSB executable, MIPS, MIPS32 version 1 (SYSV), statically linked, Go BuildID=IRctezJNHVPNNnJnDBgI/6ADhKWPq6EJYksUKRp4p/YLaVdHkmejNg2D8rO0F0/PQboJfPdRbj1gDHVxucR, with debug_info, not stripped
                                                    Entropy (8bit):6.234914820119979
                                                    TrID:
                                                    • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                    File name:mpsl.elf
                                                    File size:8'125'111 bytes
                                                    MD5:7f23defa1578bd5262829c6b8a799cff
                                                    SHA1:1926a2f8d2e3f6738032b9183e01f31af06da87c
                                                    SHA256:a1b50afacba8e00c6abc4b505d3b2d5c1c4de441892b4438cde0759ddfc029ef
                                                    SHA512:b1493c82238d092d7ab92d8bf19fe5e013e9c2796cbcd28c04a114ba6d80e1f0d19c3be4e5da94c25e2693d16dfb344c3f7d4fe711bbd38c846f4af2a0f6a9a4
                                                    SSDEEP:49152:Qy3wryBVaI2b4oCn6xTqcDkU3WcoohE2ZVREHtHcdNz14COwEUY03lNTeuh:PnUScooVoGx1bOZ/0rTph
                                                    TLSH:B6862945BD842BAAC02C4B7485FACD6523B06D144AF15A3622A5FFEDBC762347F0789C
                                                    File Content Preview:.ELF........................4..........P4. ...(.........4...4...4...................................d...d...........................$F7.$F7...............8...9...9.0.'.0.'...............`...a...a......(..........Q.td...............................p.......
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Jan 4, 2025 12:52:45.313674927 CET43928443192.168.2.2391.189.91.42
                                                    Jan 4, 2025 12:52:50.944946051 CET42836443192.168.2.2391.189.91.43
                                                    Jan 4, 2025 12:52:52.480700016 CET4251680192.168.2.23109.202.202.202
                                                    Jan 4, 2025 12:53:05.790899038 CET43928443192.168.2.2391.189.91.42
                                                    Jan 4, 2025 12:53:18.077239037 CET42836443192.168.2.2391.189.91.43
                                                    Jan 4, 2025 12:53:22.172699928 CET4251680192.168.2.23109.202.202.202
                                                    Jan 4, 2025 12:53:46.745369911 CET43928443192.168.2.2391.189.91.42

                                                    System Behavior

                                                    Start time (UTC):11:52:41
                                                    Start date (UTC):04/01/2025
                                                    Path:/tmp/mpsl.elf
                                                    Arguments:/tmp/mpsl.elf
                                                    File size:5773336 bytes
                                                    MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9