Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
mpsl.elf

Overview

General Information

Sample name:mpsl.elf
Analysis ID:1590723
MD5:12d454f447ce2dc54279eaff3f53dd7a
SHA1:fbc7305480b98b38074724db1602828e151d8169
SHA256:1a3776db32700f172b4fc76a0bb1f72221ed354484dc5bc43c8ab6c2d2fbb098
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai, Moobot
Score:100
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Detected Mirai
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Mirai
Yara detected Moobot
Sample deletes itself
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:42.0.0 Malachite
Analysis ID:1590723
Start date and time:2025-01-14 14:22:55 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 22s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:mpsl.elf
Detection:MAL
Classification:mal100.troj.evad.linELF@0/0@1/0
  • VT rate limit hit for: bot.tianyadd.top
Command:/tmp/mpsl.elf
PID:5525
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
done.
Standard Error:
  • system is lnxubuntu20
  • mpsl.elf (PID: 5525, Parent: 5444, MD5: 0d6f61f82cf2f781c6eb0661071d42d9) Arguments: /tmp/mpsl.elf
    • mpsl.elf New Fork (PID: 5528, Parent: 5525)
      • mpsl.elf New Fork (PID: 5530, Parent: 5528)
      • mpsl.elf New Fork (PID: 5534, Parent: 5528)
        • mpsl.elf New Fork (PID: 5538, Parent: 5534)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
NameDescriptionAttributionBlogpost URLsLink
MooBotNo Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.moobot
SourceRuleDescriptionAuthorStrings
mpsl.elfJoeSecurity_MoobotYara detected MoobotJoe Security
    mpsl.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      mpsl.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0xfbdc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfbf0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfc04:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfc18:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfc2c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfc40:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfc54:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfc68:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfc7c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfc90:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfca4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfcb8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfccc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfce0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfcf4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfd08:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfd1c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfd30:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfd44:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfd58:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfd6c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      SourceRuleDescriptionAuthorStrings
      5525.1.00007fe98c400000.00007fe98c412000.r-x.sdmpJoeSecurity_MoobotYara detected MoobotJoe Security
        5525.1.00007fe98c400000.00007fe98c412000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          5525.1.00007fe98c400000.00007fe98c412000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
          • 0xfbdc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xfbf0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xfc04:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xfc18:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xfc2c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xfc40:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xfc54:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xfc68:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xfc7c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xfc90:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xfca4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xfcb8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xfccc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xfce0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xfcf4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xfd08:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xfd1c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xfd30:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xfd44:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xfd58:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xfd6c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          Process Memory Space: mpsl.elf PID: 5525JoeSecurity_MoobotYara detected MoobotJoe Security
            Process Memory Space: mpsl.elf PID: 5525JoeSecurity_Mirai_8Yara detected MiraiJoe Security
              Click to see the 1 entries
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T14:23:42.352385+010020304911Malware Command and Control Activity Detected192.168.2.1547796107.189.3.21430242TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T14:23:42.890280+010020304891Malware Command and Control Activity Detected107.189.3.21430242192.168.2.1547796TCP
              2025-01-14T14:23:48.155512+010020304891Malware Command and Control Activity Detected107.189.3.21430242192.168.2.1547796TCP
              2025-01-14T14:24:08.158534+010020304891Malware Command and Control Activity Detected107.189.3.21430242192.168.2.1547796TCP
              2025-01-14T14:24:28.160448+010020304891Malware Command and Control Activity Detected107.189.3.21430242192.168.2.1547796TCP
              2025-01-14T14:24:48.163389+010020304891Malware Command and Control Activity Detected107.189.3.21430242192.168.2.1547796TCP
              2025-01-14T14:25:08.174937+010020304891Malware Command and Control Activity Detected107.189.3.21430242192.168.2.1547796TCP
              2025-01-14T14:25:28.168171+010020304891Malware Command and Control Activity Detected107.189.3.21430242192.168.2.1547796TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: mpsl.elfAvira: detected
              Source: mpsl.elfVirustotal: Detection: 60%Perma Link
              Source: mpsl.elfReversingLabs: Detection: 57%

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.15:47796 -> 107.189.3.214:30242
              Source: Network trafficSuricata IDS: 2030489 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant Server Response : 107.189.3.214:30242 -> 192.168.2.15:47796
              Source: global trafficTCP traffic: 192.168.2.15:47796 -> 107.189.3.214:30242
              Source: global trafficDNS traffic detected: DNS query: bot.tianyadd.top

              System Summary

              barindex
              Source: mpsl.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: 5525.1.00007fe98c400000.00007fe98c412000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: Process Memory Space: mpsl.elf PID: 5525, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: ELF static info symbol of initial sample.symtab present: no
              Source: mpsl.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: 5525.1.00007fe98c400000.00007fe98c412000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: Process Memory Space: mpsl.elf PID: 5525, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: classification engineClassification label: mal100.troj.evad.linELF@0/0@1/0
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/110/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/231/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/111/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/112/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/233/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/113/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/114/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/235/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/115/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/1333/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/116/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/1695/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/117/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/118/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/119/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/911/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/3875/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/914/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/10/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/917/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/11/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/12/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/13/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/14/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/15/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/16/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/17/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/18/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/19/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/1591/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/120/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/121/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/1/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/122/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/243/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/2/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/123/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/3/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/124/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/1588/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/125/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/4/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/246/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/126/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/5/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/127/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/6/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/1585/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/128/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/7/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/129/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/8/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/800/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/9/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/802/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/803/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/804/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/20/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/21/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/3407/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/22/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/23/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/24/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/25/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/26/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/27/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/28/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/29/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/1484/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/490/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/250/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/130/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/251/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/131/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/132/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/133/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/1479/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/378/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/258/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/259/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/931/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/1595/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/812/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/933/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/30/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/3419/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/35/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/3310/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/260/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/261/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/262/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/142/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/263/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/264/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/265/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/145/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/266/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/267/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/268/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/3303/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/269/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/1486/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/1806/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/3440/cmdlineJump to behavior
              Source: /tmp/mpsl.elf (PID: 5530)File opened: /proc/270/cmdlineJump to behavior

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: /tmp/mpsl.elf (PID: 5525)File: /tmp/mpsl.elfJump to behavior
              Source: /tmp/mpsl.elf (PID: 5525)Queries kernel information via 'uname': Jump to behavior
              Source: mpsl.elf, 5525.1.000055e13393f000.000055e1339c6000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/mipsel
              Source: mpsl.elf, 5525.1.00007ffe8396d000.00007ffe8398e000.rw-.sdmpBinary or memory string: plx86_64/usr/bin/qemu-mipsel/tmp/mpsl.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/mpsl.elf
              Source: mpsl.elf, 5525.1.000055e13393f000.000055e1339c6000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/mipsel
              Source: mpsl.elf, 5525.1.00007ffe8396d000.00007ffe8398e000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mipsel

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: mpsl.elf, type: SAMPLE
              Source: Yara matchFile source: 5525.1.00007fe98c400000.00007fe98c412000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: mpsl.elf PID: 5525, type: MEMORYSTR
              Source: Yara matchFile source: mpsl.elf, type: SAMPLE
              Source: Yara matchFile source: 5525.1.00007fe98c400000.00007fe98c412000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: mpsl.elf PID: 5525, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant Server Response
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant Server Response
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant Server Response
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant Server Response
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant Server Response
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant Server Response
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant Server Response
              Source: Yara matchFile source: mpsl.elf, type: SAMPLE
              Source: Yara matchFile source: 5525.1.00007fe98c400000.00007fe98c412000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: mpsl.elf PID: 5525, type: MEMORYSTR
              Source: Yara matchFile source: mpsl.elf, type: SAMPLE
              Source: Yara matchFile source: 5525.1.00007fe98c400000.00007fe98c412000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: mpsl.elf PID: 5525, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
              File Deletion
              1
              OS Credential Dumping
              11
              Security Software Discovery
              Remote ServicesData from Local System1
              Non-Standard Port
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
              Non-Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              No configs have been found
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Number of created Files
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1590723 Sample: mpsl.elf Startdate: 14/01/2025 Architecture: LINUX Score: 100 20 bot.tianyadd.top 107.189.3.214, 30242, 47796 PONYNETUS United States 2->20 22 Suricata IDS alerts for network traffic 2->22 24 Malicious sample detected (through community Yara rule) 2->24 26 Antivirus / Scanner detection for submitted sample 2->26 28 4 other signatures 2->28 9 mpsl.elf 2->9         started        signatures3 process4 signatures5 30 Sample deletes itself 9->30 12 mpsl.elf 9->12         started        process6 process7 14 mpsl.elf 12->14         started        16 mpsl.elf 12->16         started        process8 18 mpsl.elf 14->18         started       

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              mpsl.elf60%VirustotalBrowse
              mpsl.elf58%ReversingLabsLinux.Trojan.Mirai
              mpsl.elf100%AviraEXP/ELF.Mirai.Z.A
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              bot.tianyadd.top
              107.189.3.214
              truetrue
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                107.189.3.214
                bot.tianyadd.topUnited States
                53667PONYNETUStrue
                No context
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                PONYNETUShttps://clients.dedicatedservicesusa.comGet hashmaliciousUnknownBrowse
                • 198.98.59.241
                m68k.elfGet hashmaliciousMirai, MoobotBrowse
                • 107.189.4.201
                ppc.elfGet hashmaliciousMirai, MoobotBrowse
                • 107.189.4.201
                spc.elfGet hashmaliciousMirai, MoobotBrowse
                • 107.189.4.201
                sh4.elfGet hashmaliciousMirai, MoobotBrowse
                • 107.189.4.201
                uShK30bvrV.exeGet hashmaliciousRemcosBrowse
                • 172.86.115.221
                miori.spc.elfGet hashmaliciousUnknownBrowse
                • 107.189.6.73
                cZO.exeGet hashmaliciousUnknownBrowse
                • 107.189.28.6
                file.exeGet hashmaliciousUnknownBrowse
                • 205.185.126.56
                file.exeGet hashmaliciousUnknownBrowse
                • 205.185.126.56
                No context
                No context
                No created / dropped files found
                File type:ELF 32-bit LSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, stripped
                Entropy (8bit):5.531845160397216
                TrID:
                • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                File name:mpsl.elf
                File size:73'796 bytes
                MD5:12d454f447ce2dc54279eaff3f53dd7a
                SHA1:fbc7305480b98b38074724db1602828e151d8169
                SHA256:1a3776db32700f172b4fc76a0bb1f72221ed354484dc5bc43c8ab6c2d2fbb098
                SHA512:a9f995cb2dde5c9d6c50e3af3063af97b3f00bdb2b66477ae0c6fc72b88a241cf13d5d27ca106bf6168861c7a8f1710b5bab6628e5ec4e5cbc46cb8d2f36b89f
                SSDEEP:768:K3sJmkqIlhWHgJvd8p6Es5Des4ReDB2wJ2iwgugBI2ZpMIXi5Ij7+eOcIoJhwnmS:KcJmkN1D5B4RcBvC8W2ZpMe7+pcI3nm
                TLSH:A473C61AFF620FF7DC6BCD3745A8170239CC554A12A47B3A7534D828B65B24B49E3C68
                File Content Preview:.ELF....................`.@.4...<.......4. ...(...............@...@...........................E...E......*..........Q.td...............................<...'!......'.......................<...'!... .........9'.. ........................<...'!...........0.9

                ELF header

                Class:ELF32
                Data:2's complement, little endian
                Version:1 (current)
                Machine:MIPS R3000
                Version Number:0x1
                Type:EXEC (Executable file)
                OS/ABI:UNIX - System V
                ABI Version:0
                Entry Point Address:0x400260
                Flags:0x1007
                ELF Header Size:52
                Program Header Offset:52
                Program Header Size:32
                Number of Program Headers:3
                Section Header Offset:73276
                Section Header Size:40
                Number of Section Headers:13
                Header String Table Index:12
                NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                NULL0x00x00x00x00x0000
                .initPROGBITS0x4000940x940x8c0x00x6AX004
                .textPROGBITS0x4001200x1200xf9800x00x6AX0016
                .finiPROGBITS0x40faa00xfaa00x5c0x00x6AX004
                .rodataPROGBITS0x40fb000xfb000x1ae00x00x2A0016
                .ctorsPROGBITS0x4515e40x115e40x80x00x3WA004
                .dtorsPROGBITS0x4515ec0x115ec0x80x00x3WA004
                .dataPROGBITS0x4516000x116000x3a00x00x3WA0016
                .gotPROGBITS0x4519a00x119a00x4440x40x10000003WAp0016
                .sbssNOBITS0x451de40x11de40x1c0x00x10000003WAp004
                .bssNOBITS0x451e000x11de40x22000x00x3WA0016
                .mdebug.abi32PROGBITS0x9120x11de40x00x00x0001
                .shstrtabSTRTAB0x00x11de40x570x00x0001
                TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                LOAD0x00x4000000x4000000x115e00x115e05.56490x5R E0x10000.init .text .fini .rodata
                LOAD0x115e40x4515e40x4515e40x8000x2a1c3.73520x6RW 0x10000.ctors .dtors .data .got .sbss .bss
                GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                2025-01-14T14:23:42.352385+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1547796107.189.3.21430242TCP
                2025-01-14T14:23:42.890280+01002030489ET MALWARE ELF/MooBot Mirai DDoS Variant Server Response1107.189.3.21430242192.168.2.1547796TCP
                2025-01-14T14:23:48.155512+01002030489ET MALWARE ELF/MooBot Mirai DDoS Variant Server Response1107.189.3.21430242192.168.2.1547796TCP
                2025-01-14T14:24:08.158534+01002030489ET MALWARE ELF/MooBot Mirai DDoS Variant Server Response1107.189.3.21430242192.168.2.1547796TCP
                2025-01-14T14:24:28.160448+01002030489ET MALWARE ELF/MooBot Mirai DDoS Variant Server Response1107.189.3.21430242192.168.2.1547796TCP
                2025-01-14T14:24:48.163389+01002030489ET MALWARE ELF/MooBot Mirai DDoS Variant Server Response1107.189.3.21430242192.168.2.1547796TCP
                2025-01-14T14:25:08.174937+01002030489ET MALWARE ELF/MooBot Mirai DDoS Variant Server Response1107.189.3.21430242192.168.2.1547796TCP
                2025-01-14T14:25:28.168171+01002030489ET MALWARE ELF/MooBot Mirai DDoS Variant Server Response1107.189.3.21430242192.168.2.1547796TCP
                TimestampSource PortDest PortSource IPDest IP
                Jan 14, 2025 14:23:42.345592976 CET4779630242192.168.2.15107.189.3.214
                Jan 14, 2025 14:23:42.350487947 CET3024247796107.189.3.214192.168.2.15
                Jan 14, 2025 14:23:42.350544930 CET4779630242192.168.2.15107.189.3.214
                Jan 14, 2025 14:23:42.352385044 CET4779630242192.168.2.15107.189.3.214
                Jan 14, 2025 14:23:42.357188940 CET3024247796107.189.3.214192.168.2.15
                Jan 14, 2025 14:23:42.890280008 CET3024247796107.189.3.214192.168.2.15
                Jan 14, 2025 14:23:42.890477896 CET4779630242192.168.2.15107.189.3.214
                Jan 14, 2025 14:23:48.155512094 CET3024247796107.189.3.214192.168.2.15
                Jan 14, 2025 14:23:48.155741930 CET4779630242192.168.2.15107.189.3.214
                Jan 14, 2025 14:23:58.165604115 CET4779630242192.168.2.15107.189.3.214
                Jan 14, 2025 14:23:58.377444029 CET4779630242192.168.2.15107.189.3.214
                Jan 14, 2025 14:23:58.589214087 CET4779630242192.168.2.15107.189.3.214
                Jan 14, 2025 14:23:58.999613047 CET3024247796107.189.3.214192.168.2.15
                Jan 14, 2025 14:23:58.999644995 CET3024247796107.189.3.214192.168.2.15
                Jan 14, 2025 14:23:58.999671936 CET3024247796107.189.3.214192.168.2.15
                Jan 14, 2025 14:24:08.158534050 CET3024247796107.189.3.214192.168.2.15
                Jan 14, 2025 14:24:08.158976078 CET4779630242192.168.2.15107.189.3.214
                Jan 14, 2025 14:24:28.160448074 CET3024247796107.189.3.214192.168.2.15
                Jan 14, 2025 14:24:28.160660982 CET4779630242192.168.2.15107.189.3.214
                Jan 14, 2025 14:24:48.163388968 CET3024247796107.189.3.214192.168.2.15
                Jan 14, 2025 14:24:48.163485050 CET4779630242192.168.2.15107.189.3.214
                Jan 14, 2025 14:25:08.174937010 CET3024247796107.189.3.214192.168.2.15
                Jan 14, 2025 14:25:08.175195932 CET4779630242192.168.2.15107.189.3.214
                Jan 14, 2025 14:25:28.168170929 CET3024247796107.189.3.214192.168.2.15
                Jan 14, 2025 14:25:28.168236017 CET4779630242192.168.2.15107.189.3.214
                TimestampSource PortDest PortSource IPDest IP
                Jan 14, 2025 14:23:42.045480013 CET4476353192.168.2.158.8.8.8
                Jan 14, 2025 14:23:42.344413996 CET53447638.8.8.8192.168.2.15
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Jan 14, 2025 14:23:42.045480013 CET192.168.2.158.8.8.80x19c4Standard query (0)bot.tianyadd.topA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Jan 14, 2025 14:23:42.344413996 CET8.8.8.8192.168.2.150x19c4No error (0)bot.tianyadd.top107.189.3.214A (IP address)IN (0x0001)false

                System Behavior

                Start time (UTC):13:23:41
                Start date (UTC):14/01/2025
                Path:/tmp/mpsl.elf
                Arguments:/tmp/mpsl.elf
                File size:5773336 bytes
                MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                Start time (UTC):13:23:41
                Start date (UTC):14/01/2025
                Path:/tmp/mpsl.elf
                Arguments:-
                File size:5773336 bytes
                MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                Start time (UTC):13:23:41
                Start date (UTC):14/01/2025
                Path:/tmp/mpsl.elf
                Arguments:-
                File size:5773336 bytes
                MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                Start time (UTC):13:23:41
                Start date (UTC):14/01/2025
                Path:/tmp/mpsl.elf
                Arguments:-
                File size:5773336 bytes
                MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                Start time (UTC):13:23:41
                Start date (UTC):14/01/2025
                Path:/tmp/mpsl.elf
                Arguments:-
                File size:5773336 bytes
                MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9