Edit tour

Linux Analysis Report
mpsl.elf

Overview

General Information

Sample name:mpsl.elf
Analysis ID:1642458
MD5:b6020a4fe05dae86701859c56fc8f05f
SHA1:b34b72a87858e991e30da071b232b1f92b51a374
SHA256:a185e9a92684a2e14e390eedae15c8544d435ff6deb8b65e3ad066dd9dd5fa41
Tags:elfMiraiuser-abuse_ch
Infos:

Detection

Score:52
Range:0 - 100

Signatures

Multi AV Scanner detection for submitted file
Sample reads /proc/mounts (often used for finding a writable filesystem)
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1642458
Start date and time:2025-03-19 03:46:58 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 47s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:mpsl.elf
Detection:MAL
Classification:mal52.troj.linELF@0/3@2/0
Command:/tmp/mpsl.elf
PID:5517
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
For God so loved the world
Standard Error:
  • system is lnxubuntu20
  • mpsl.elf (PID: 5517, Parent: 5433, MD5: 0d6f61f82cf2f781c6eb0661071d42d9) Arguments: /tmp/mpsl.elf
    • mpsl.elf New Fork (PID: 5523, Parent: 5517)
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: mpsl.elfVirustotal: Detection: 9%Perma Link
Source: /tmp/mpsl.elf (PID: 5523)Socket: 127.0.0.1:22448Jump to behavior
Source: global trafficTCP traffic: 192.168.2.14:46540 -> 185.125.190.26:443
Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
Source: unknownNetwork traffic detected: HTTP traffic on port 46540 -> 443
Source: ELF static info symbol of initial sample.symtab present: no
Source: /tmp/mpsl.elf (PID: 5517)SIGKILL sent: pid: 1 (init), result: successfulJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)SIGKILL sent: pid: 1300, result: successfulJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)SIGKILL sent: pid: 2956, result: successfulJump to behavior
Source: classification engineClassification label: mal52.troj.linELF@0/3@2/0

Persistence and Installation Behavior

barindex
Source: /tmp/mpsl.elf (PID: 5517)File: /proc/5517/mountsJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/1583/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/2672/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/110/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/111/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/112/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/113/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/234/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/1577/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/114/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/235/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/115/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/116/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/117/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/118/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/119/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/10/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/11/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/12/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/13/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/14/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/15/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/16/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/17/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/18/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/19/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/1593/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/240/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/120/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/3094/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/121/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/242/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/3406/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/1/mapsJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/122/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/243/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/2/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/123/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/244/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/1589/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/3/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/124/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/245/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/125/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/4/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/246/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/3402/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/126/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/5/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/247/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/127/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/6/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/248/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/128/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/7/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/249/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/8/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/129/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/3762/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/9/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/801/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/3763/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/3643/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/3764/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/803/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/3765/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/20/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/806/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/21/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/807/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/928/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/22/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/23/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/24/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/25/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/26/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/27/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/28/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/29/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/3420/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/490/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/250/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/130/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/251/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/131/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/252/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/132/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/253/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/254/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/255/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/135/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/256/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/1599/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/257/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/378/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/258/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/3412/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/259/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/30/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/35/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/1371/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)File opened: /proc/260/cmdlineJump to behavior
Source: /tmp/mpsl.elf (PID: 5517)Queries kernel information via 'uname': Jump to behavior
Source: mpsl.elf, 5523.1.00007ffcd2df8000.00007ffcd2e19000.rw-.sdmpBinary or memory string: exed the wor!/qemu-open.XXXXX
Source: mpsl.elf, 5517.1.00007fe48c444000.00007fe48c44a000.rw-.sdmp, mpsl.elf, 5523.1.00007fe48c444000.00007fe48c44a000.rw-.sdmpBinary or memory string: 1Zm6vnZ5U4mf8vApyWcDwXR44ZAkzslsN1!a1gCWFxqAHsFWFMWRHVDR44!!a1gCWFxqAHsFWFMWT3YAyD!!a1gAWFxuAXsFWUgBRQAA!!a1gAWFxuAXsAWUgKRXgA!!a1gAWFxuAXsAWEgJR3IA!!a10CWFxuAHsGWVcWQHAA!!a10CWFxuAHsGWVcWQHUA!!aFwAWF9uA3sGW0gLRgAA!1aFwAWFlpG2QBW0gJTwAA1!qemu-arm2QBW0gJTwAA!
Source: mpsl.elf, 5517.1.00007ffcd2df8000.00007ffcd2e19000.rw-.sdmp, mpsl.elf, 5523.1.00007ffcd2df8000.00007ffcd2e19000.rw-.sdmpBinary or memory string: pDh!Rx86_64/usr/bin/qemu-mipsel/tmp/mpsl.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/mpsl.elf
Source: mpsl.elf, 5517.1.000055be14172000.000055be14219000.rw-.sdmp, mpsl.elf, 5523.1.000055be14172000.000055be14219000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/mipsel
Source: mpsl.elf, 5523.1.00007fe48c444000.00007fe48c44a000.rw-.sdmpBinary or memory string: vmware
Source: mpsl.elf, 5517.1.00007ffcd2df8000.00007ffcd2e19000.rw-.sdmpBinary or memory string: /tmp/qemu-open.UQiuPk
Source: mpsl.elf, 5517.1.00007fe48c444000.00007fe48c44a000.rw-.sdmp, mpsl.elf, 5523.1.00007fe48c444000.00007fe48c44a000.rw-.sdmpBinary or memory string: qemu-arm
Source: mpsl.elf, 5517.1.00007ffcd2df8000.00007ffcd2e19000.rw-.sdmp, mpsl.elf, 5523.1.00007ffcd2df8000.00007ffcd2e19000.rw-.sdmpBinary or memory string: /qemu-open.XXXXX
Source: mpsl.elf, 5517.1.000055be14172000.000055be14219000.rw-.sdmp, mpsl.elf, 5523.1.000055be14172000.000055be14219000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/mipsel
Source: mpsl.elf, 5517.1.00007ffcd2df8000.00007ffcd2e19000.rw-.sdmpBinary or memory string: U/tmp/qemu-open.UQiuPk\tZ
Source: mpsl.elf, 5517.1.00007ffcd2df8000.00007ffcd2e19000.rw-.sdmp, mpsl.elf, 5523.1.00007ffcd2df8000.00007ffcd2e19000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mipsel
Source: mpsl.elf, 5523.1.00007ffcd2df8000.00007ffcd2e19000.rw-.sdmpBinary or memory string: qemu: uncaught target signal 11 (Segmentation fault) - core dumped
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume Access1
OS Credential Dumping
11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1642458 Sample: mpsl.elf Startdate: 19/03/2025 Architecture: LINUX Score: 52 12 185.125.190.26, 443 CANONICAL-ASGB United Kingdom 2->12 14 daisy.ubuntu.com 2->14 16 Multi AV Scanner detection for submitted file 2->16 7 mpsl.elf 2->7         started        signatures3 process4 signatures5 18 Sample reads /proc/mounts (often used for finding a writable filesystem) 7->18 10 mpsl.elf 7->10         started        process6

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
mpsl.elf9%VirustotalBrowse
mpsl.elf6%ReversingLabsLinux.Trojan.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.24
truefalse
    high
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    185.125.190.26
    unknownUnited Kingdom
    41231CANONICAL-ASGBfalse
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    185.125.190.26FederalppcAgent.elfGet hashmaliciousMiraiBrowse
      na.elfGet hashmaliciousPrometeiBrowse
        Mozi.m.elfGet hashmaliciousMiraiBrowse
          na.elfGet hashmaliciousPrometeiBrowse
            2gkeFl1jcj.elfGet hashmaliciousUnknownBrowse
              x-8.6-.Sakura.elfGet hashmaliciousGafgyt, MiraiBrowse
                na.elfGet hashmaliciousPrometeiBrowse
                  boatnet.arm6.elfGet hashmaliciousMiraiBrowse
                    boatnet.sh4.elfGet hashmaliciousMiraiBrowse
                      na.elfGet hashmaliciousPrometeiBrowse
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        daisy.ubuntu.comFederalmipsAgent.elfGet hashmaliciousMiraiBrowse
                        • 162.213.35.25
                        FederalppcAgent.elfGet hashmaliciousMiraiBrowse
                        • 162.213.35.24
                        resgod.x86.elfGet hashmaliciousMiraiBrowse
                        • 162.213.35.24
                        FederalarcAgent.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.24
                        FederalmpslAgent.elfGet hashmaliciousMiraiBrowse
                        • 162.213.35.24
                        Federalx86Agent.elfGet hashmaliciousMiraiBrowse
                        • 162.213.35.25
                        Federali686Agent.elfGet hashmaliciousMiraiBrowse
                        • 162.213.35.25
                        Federalarm6Agent.elfGet hashmaliciousMiraiBrowse
                        • 162.213.35.24
                        Federalarm5Agent.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.25
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        CANONICAL-ASGBFederalm68kAgent.elfGet hashmaliciousMiraiBrowse
                        • 91.189.91.42
                        na.elfGet hashmaliciousPrometeiBrowse
                        • 91.189.91.42
                        Federalsh4Agent.elfGet hashmaliciousMiraiBrowse
                        • 91.189.91.42
                        FederalarmAgent.elfGet hashmaliciousMiraiBrowse
                        • 91.189.91.42
                        Federalarm7Agent.elfGet hashmaliciousMiraiBrowse
                        • 91.189.91.42
                        na.elfGet hashmaliciousPrometeiBrowse
                        • 91.189.91.42
                        .i.elfGet hashmaliciousUnknownBrowse
                        • 91.189.91.42
                        na.elfGet hashmaliciousPrometeiBrowse
                        • 91.189.91.42
                        mpsl.elfGet hashmaliciousUnknownBrowse
                        • 91.189.91.42
                        arm5.elfGet hashmaliciousUnknownBrowse
                        • 91.189.91.42
                        No context
                        No context
                        Process:/tmp/mpsl.elf
                        File Type:data
                        Category:dropped
                        Size (bytes):14
                        Entropy (8bit):3.2359263506290334
                        Encrypted:false
                        SSDEEP:3:TgLJLG:TgLFG
                        MD5:F38566EE0BC1CD8FBC1A2366D5C73FFE
                        SHA1:670B71B3B2F7C95A453BE48DE048B4D331E9AF5C
                        SHA-256:8DE045D1FFCA4ADCA0440D72EE8946E5BE883FA1036732770285BF5A272DD618
                        SHA-512:E57F865160CA30D18A02E3A408DC813DE15AB05E4831E8F92F431320C331C3D0F6806831E099DD93A1D07AC22AB7C890957DE1078C71EB711780F116AA228165
                        Malicious:false
                        Reputation:moderate, very likely benign file
                        Preview:/tmp/mpsl.elf.
                        Process:/tmp/mpsl.elf
                        File Type:data
                        Category:dropped
                        Size (bytes):14
                        Entropy (8bit):3.2359263506290334
                        Encrypted:false
                        SSDEEP:3:TgLJLG:TgLFG
                        MD5:F38566EE0BC1CD8FBC1A2366D5C73FFE
                        SHA1:670B71B3B2F7C95A453BE48DE048B4D331E9AF5C
                        SHA-256:8DE045D1FFCA4ADCA0440D72EE8946E5BE883FA1036732770285BF5A272DD618
                        SHA-512:E57F865160CA30D18A02E3A408DC813DE15AB05E4831E8F92F431320C331C3D0F6806831E099DD93A1D07AC22AB7C890957DE1078C71EB711780F116AA228165
                        Malicious:false
                        Reputation:moderate, very likely benign file
                        Preview:/tmp/mpsl.elf.
                        Process:/tmp/mpsl.elf
                        File Type:data
                        Category:dropped
                        Size (bytes):14
                        Entropy (8bit):3.2359263506290334
                        Encrypted:false
                        SSDEEP:3:TgLJLG:TgLFG
                        MD5:F38566EE0BC1CD8FBC1A2366D5C73FFE
                        SHA1:670B71B3B2F7C95A453BE48DE048B4D331E9AF5C
                        SHA-256:8DE045D1FFCA4ADCA0440D72EE8946E5BE883FA1036732770285BF5A272DD618
                        SHA-512:E57F865160CA30D18A02E3A408DC813DE15AB05E4831E8F92F431320C331C3D0F6806831E099DD93A1D07AC22AB7C890957DE1078C71EB711780F116AA228165
                        Malicious:false
                        Reputation:moderate, very likely benign file
                        Preview:/tmp/mpsl.elf.
                        File type:ELF 32-bit LSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, stripped
                        Entropy (8bit):4.868656485735086
                        TrID:
                        • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                        File name:mpsl.elf
                        File size:211'220 bytes
                        MD5:b6020a4fe05dae86701859c56fc8f05f
                        SHA1:b34b72a87858e991e30da071b232b1f92b51a374
                        SHA256:a185e9a92684a2e14e390eedae15c8544d435ff6deb8b65e3ad066dd9dd5fa41
                        SHA512:b628610122b56eb6f1fc4ff6fa17b28b147e25698fd8db7e354faf389ebffea2e4dbfe25fdde8bc94ad9a5d3f5a0518360c4cd5f87d7eda1d0e4a23d63691a52
                        SSDEEP:1536:0Er/x952EZbv66bCFIV6r9VFGnU1xlbDrT8FuZeXrxmMElymrrZK9:0Er/j52EpCFMeWwxR8UoXr0Z
                        TLSH:37246386BFA13FFFC81ECD3702958A05129D890A52D5AF772B34D518B69B10A9DD3C8C
                        File Content Preview:.ELF....................`.@.4....7......4. ...(...............@...@..(...(..............<0..<0D.<0D.x....O..........Q.td...............................'...................<...'!.............9'.. ........................<...'!... .........9'.. ............

                        ELF header

                        Class:ELF32
                        Data:2's complement, little endian
                        Version:1 (current)
                        Machine:MIPS R3000
                        Version Number:0x1
                        Type:EXEC (Executable file)
                        OS/ABI:UNIX - System V
                        ABI Version:0
                        Entry Point Address:0x400260
                        Flags:0x1007
                        ELF Header Size:52
                        Program Header Offset:52
                        Program Header Size:32
                        Number of Program Headers:3
                        Section Header Offset:210700
                        Section Header Size:40
                        Number of Section Headers:13
                        Header String Table Index:12
                        NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                        NULL0x00x00x00x00x0000
                        .initPROGBITS0x4000940x940x7c0x00x6AX004
                        .textPROGBITS0x4001100x1100x309f00x00x6AX0016
                        .finiPROGBITS0x430b000x30b000x4c0x00x6AX004
                        .rodataPROGBITS0x430b500x30b500x1d800x00x2A0016
                        .ctorsPROGBITS0x44303c0x3303c0x80x00x3WA004
                        .dtorsPROGBITS0x4430440x330440x80x00x3WA004
                        .data.rel.roPROGBITS0x4430500x330500x600x00x3WA004
                        .dataPROGBITS0x4430b00x330b00xd00x00x3WA0016
                        .gotPROGBITS0x4431800x331800x5340x40x10000003WAp0016
                        .sbssNOBITS0x4436b40x336b40x140x00x10000003WAp004
                        .bssNOBITS0x4436d00x336b40x48f00x00x3WA0016
                        .shstrtabSTRTAB0x00x336b40x560x00x0001
                        TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                        LOAD0x00x4000000x4000000x328d00x328d04.89420x5R E0x10000.init .text .fini .rodata
                        LOAD0x3303c0x44303c0x44303c0x6780x4f844.90100x6RW 0x10000.ctors .dtors .data.rel.ro .data .got .sbss .bss
                        GNU_STACK0x00x00x00x00x00.00000x7RWE0x4

                        Download Network PCAP: filteredfull

                        • Total Packets: 4
                        • 443 (HTTPS)
                        • 53 (DNS)
                        TimestampSource PortDest PortSource IPDest IP
                        Mar 19, 2025 03:48:03.011589050 CET46540443192.168.2.14185.125.190.26
                        Mar 19, 2025 03:48:33.474267006 CET46540443192.168.2.14185.125.190.26
                        TimestampSource PortDest PortSource IPDest IP
                        Mar 19, 2025 03:47:59.237795115 CET5769953192.168.2.148.8.8.8
                        Mar 19, 2025 03:47:59.237941980 CET5754953192.168.2.148.8.8.8
                        Mar 19, 2025 03:47:59.244287968 CET53576998.8.8.8192.168.2.14
                        Mar 19, 2025 03:47:59.244316101 CET53575498.8.8.8192.168.2.14
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Mar 19, 2025 03:47:59.237795115 CET192.168.2.148.8.8.80x9fccStandard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                        Mar 19, 2025 03:47:59.237941980 CET192.168.2.148.8.8.80xde4fStandard query (0)daisy.ubuntu.com28IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Mar 19, 2025 03:47:59.244287968 CET8.8.8.8192.168.2.140x9fccNo error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
                        Mar 19, 2025 03:47:59.244287968 CET8.8.8.8192.168.2.140x9fccNo error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false

                        System Behavior

                        Start time (UTC):02:47:56
                        Start date (UTC):19/03/2025
                        Path:/tmp/mpsl.elf
                        Arguments:-
                        File size:5773336 bytes
                        MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9