Edit tour

Linux Analysis Report
Space.mpsl.elf

Overview

General Information

Sample name:Space.mpsl.elf
Analysis ID:1654323
MD5:9b4040d5744f5fb2075eb20d95c6cbc8
SHA1:debd850e174aa75b033423b26a7afa910afc4823
SHA256:d2144c4e57d1c88b22a9be92df490a0b0ce8fade62a7565303b9ec58568d4e13
Tags:elfuser-abuse_ch
Infos:

Detection

Score:68
Range:0 - 100

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sample is packed with UPX
Detected TCP or UDP traffic on non-standard ports
ELF contains segments with high entropy indicating compressed/encrypted content
Enumerates processes within the "proc" file system
Sample contains only a LOAD segment without any section mappings
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1654323
Start date and time:2025-04-02 09:37:41 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 51s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:Space.mpsl.elf
Detection:MAL
Classification:mal68.evad.linELF@0/0@0/0
Command:/tmp/Space.mpsl.elf
PID:5489
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
lzrd cock fest"/proc/"/exe
Standard Error:
  • system is lnxubuntu20
  • cleanup
SourceRuleDescriptionAuthorStrings
5489.1.00007fa824400000.00007fa82442a000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
  • 0x2739c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x273b0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x273c4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x273d8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x273ec:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x27400:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x27414:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x27428:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x2743c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x27450:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x27464:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x27478:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x2748c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x274a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x274b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x274c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x274dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x274f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x27504:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x27518:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x2752c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
5491.1.00007fa824400000.00007fa82442a000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
  • 0x2739c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x273b0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x273c4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x273d8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x273ec:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x27400:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x27414:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x27428:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x2743c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x27450:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x27464:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x27478:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x2748c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x274a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x274b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x274c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x274dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x274f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x27504:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x27518:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x2752c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
5493.1.00007fa824400000.00007fa82442a000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
  • 0x2739c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x273b0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x273c4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x273d8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x273ec:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x27400:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x27414:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x27428:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x2743c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x27450:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x27464:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x27478:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x2748c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x274a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x274b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x274c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x274dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x274f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x27504:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x27518:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x2752c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
5509.1.00007fa824400000.00007fa82442a000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
  • 0x2739c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x273b0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x273c4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x273d8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x273ec:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x27400:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x27414:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x27428:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x2743c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x27450:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x27464:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x27478:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x2748c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x274a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x274b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x274c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x274dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x274f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x27504:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x27518:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x2752c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
Process Memory Space: Space.mpsl.elf PID: 5489Linux_Trojan_Gafgyt_28a2fe0cunknownunknown
  • 0xb1c4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0xb1d8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0xb1ec:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0xb200:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0xb214:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0xb228:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0xb23c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0xb250:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0xb264:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0xb278:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0xb28c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0xb2a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0xb2b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0xb2c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0xb2dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0xb2f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0xb304:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0xb318:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0xb32c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0xb340:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0xb354:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
Click to see the 3 entries
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Space.mpsl.elfAvira: detected
Source: Space.mpsl.elfVirustotal: Detection: 43%Perma Link
Source: Space.mpsl.elfReversingLabs: Detection: 50%
Source: global trafficTCP traffic: 192.168.2.14:42786 -> 176.65.144.220:3778
Source: global trafficTCP traffic: 192.168.2.14:46540 -> 185.125.190.26:443
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: Space.mpsl.elfString found in binary or memory: http://upx.sf.net
Source: unknownNetwork traffic detected: HTTP traffic on port 46540 -> 443

System Summary

barindex
Source: 5489.1.00007fa824400000.00007fa82442a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: 5491.1.00007fa824400000.00007fa82442a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: 5493.1.00007fa824400000.00007fa82442a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: 5509.1.00007fa824400000.00007fa82442a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: Process Memory Space: Space.mpsl.elf PID: 5489, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: Process Memory Space: Space.mpsl.elf PID: 5491, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: Process Memory Space: Space.mpsl.elf PID: 5493, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: Process Memory Space: Space.mpsl.elf PID: 5509, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: LOAD without section mappingsProgram segment: 0x100000
Source: 5489.1.00007fa824400000.00007fa82442a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: 5491.1.00007fa824400000.00007fa82442a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: 5493.1.00007fa824400000.00007fa82442a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: 5509.1.00007fa824400000.00007fa82442a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: Process Memory Space: Space.mpsl.elf PID: 5489, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: Process Memory Space: Space.mpsl.elf PID: 5491, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: Process Memory Space: Space.mpsl.elf PID: 5493, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: Process Memory Space: Space.mpsl.elf PID: 5509, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: classification engineClassification label: mal68.evad.linELF@0/0@0/0

Data Obfuscation

barindex
Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sampleString containing UPX found: $Id: UPX 3.94 Copyright (C) 1996-2017 the UPX Team. All Rights Reserved. $
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/3760/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/1583/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/2672/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/110/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/3759/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/111/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/112/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/113/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/234/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/1577/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/114/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/235/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/115/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/116/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/117/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/118/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/119/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/3757/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/10/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/917/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/3758/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/11/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/12/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/13/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/14/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/15/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/16/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/17/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/18/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/19/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/1593/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/240/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/120/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/3094/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/121/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/242/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/3406/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/1/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/122/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/243/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/2/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/123/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/244/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/1589/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/3/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/124/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/245/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/1588/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/125/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/4/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/246/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/3402/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/126/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/5/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/247/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/127/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/6/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/248/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/128/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/7/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/249/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/8/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/129/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/800/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/9/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/801/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/803/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/20/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/806/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/21/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/807/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/928/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/22/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/23/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/24/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/25/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/26/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/27/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/28/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/29/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/3420/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/490/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/250/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/130/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/251/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/131/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/252/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/132/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/253/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/254/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/255/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/135/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/256/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/1599/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/257/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/378/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/258/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/3412/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/259/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/30/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/35/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/1371/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/260/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/261/statusJump to behavior
Source: /tmp/Space.mpsl.elf (PID: 5489)File opened: /proc/262/statusJump to behavior
Source: Space.mpsl.elfSubmission file: segment LOAD with 7.9459 entropy (max. 8.0)
Source: /tmp/Space.mpsl.elf (PID: 5489)Queries kernel information via 'uname': Jump to behavior
Source: Space.mpsl.elf, 5489.1.00005597040bc000.0000559704164000.rw-.sdmp, Space.mpsl.elf, 5491.1.00005597040bc000.0000559704164000.rw-.sdmp, Space.mpsl.elf, 5493.1.00005597040bc000.0000559704164000.rw-.sdmp, Space.mpsl.elf, 5509.1.00005597040bc000.0000559704164000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/mipsel
Source: Space.mpsl.elf, 5489.1.00007fffa75ed000.00007fffa760e000.rw-.sdmp, Space.mpsl.elf, 5491.1.00007fffa75ed000.00007fffa760e000.rw-.sdmp, Space.mpsl.elf, 5493.1.00007fffa75ed000.00007fffa760e000.rw-.sdmp, Space.mpsl.elf, 5509.1.00007fffa75ed000.00007fffa760e000.rw-.sdmpBinary or memory string: tx86_64/usr/bin/qemu-mipsel/tmp/Space.mpsl.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/Space.mpsl.elf
Source: Space.mpsl.elf, 5489.1.00005597040bc000.0000559704164000.rw-.sdmp, Space.mpsl.elf, 5491.1.00005597040bc000.0000559704164000.rw-.sdmp, Space.mpsl.elf, 5493.1.00005597040bc000.0000559704164000.rw-.sdmp, Space.mpsl.elf, 5509.1.00005597040bc000.0000559704164000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/mipsel
Source: Space.mpsl.elf, 5489.1.00007fffa75ed000.00007fffa760e000.rw-.sdmp, Space.mpsl.elf, 5491.1.00007fffa75ed000.00007fffa760e000.rw-.sdmp, Space.mpsl.elf, 5493.1.00007fffa75ed000.00007fffa760e000.rw-.sdmp, Space.mpsl.elf, 5509.1.00007fffa75ed000.00007fffa760e000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mipsel
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception11
Obfuscated Files or Information
1
OS Credential Dumping
11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1654323 Sample: Space.mpsl.elf Startdate: 02/04/2025 Architecture: LINUX Score: 68 20 176.65.144.220, 3778, 42786, 42788 PALTEL-ASPALTELAutonomousSystemPS Germany 2->20 22 185.125.190.26, 443 CANONICAL-ASGB United Kingdom 2->22 24 Malicious sample detected (through community Yara rule) 2->24 26 Antivirus / Scanner detection for submitted sample 2->26 28 Multi AV Scanner detection for submitted file 2->28 30 Sample is packed with UPX 2->30 8 Space.mpsl.elf 2->8         started        signatures3 process4 process5 10 Space.mpsl.elf 8->10         started        12 Space.mpsl.elf 8->12         started        14 Space.mpsl.elf 8->14         started        process6 16 Space.mpsl.elf 10->16         started        18 Space.mpsl.elf 10->18         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Space.mpsl.elf44%VirustotalBrowse
Space.mpsl.elf50%ReversingLabsLinux.Trojan.Mirai
Space.mpsl.elf100%AviraEXP/ELF.Agent.M.28
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netSpace.mpsl.elffalse
    high
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    185.125.190.26
    unknownUnited Kingdom
    41231CANONICAL-ASGBfalse
    176.65.144.220
    unknownGermany
    12975PALTEL-ASPALTELAutonomousSystemPSfalse
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    185.125.190.26na.elfGet hashmaliciousPrometeiBrowse
      vejfa5.elfGet hashmaliciousUnknownBrowse
        arc.elfGet hashmaliciousUnknownBrowse
          na.elfGet hashmaliciousPrometeiBrowse
            jfeeps.elfGet hashmaliciousUnknownBrowse
              bejv86.elfGet hashmaliciousUnknownBrowse
                FederalAgent.mips.elfGet hashmaliciousMiraiBrowse
                  FederalAgent.i686.elfGet hashmaliciousMiraiBrowse
                    FederalAgent.arm.elfGet hashmaliciousMiraiBrowse
                      FederalAgent.arm7.elfGet hashmaliciousMiraiBrowse
                        176.65.144.220Space.x86.elfGet hashmaliciousUnknownBrowse
                          No context
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          CANONICAL-ASGBSpace.arc.elfGet hashmaliciousMiraiBrowse
                          • 91.189.91.42
                          mips.elfGet hashmaliciousUnknownBrowse
                          • 91.189.91.42
                          FBI.mpsl.elfGet hashmaliciousGafgyt, MiraiBrowse
                          • 91.189.91.42
                          FBI.x86.elfGet hashmaliciousGafgyt, MiraiBrowse
                          • 91.189.91.42
                          FBI.arm5.elfGet hashmaliciousGafgyt, MiraiBrowse
                          • 91.189.91.42
                          na.elfGet hashmaliciousPrometeiBrowse
                          • 91.189.91.42
                          na.elfGet hashmaliciousPrometeiBrowse
                          • 91.189.91.42
                          na.elfGet hashmaliciousPrometeiBrowse
                          • 91.189.91.42
                          arm5.elfGet hashmaliciousUnknownBrowse
                          • 91.189.91.42
                          rjfe686.elfGet hashmaliciousUnknownBrowse
                          • 91.189.91.42
                          PALTEL-ASPALTELAutonomousSystemPSSpace.x86.elfGet hashmaliciousUnknownBrowse
                          • 176.65.144.220
                          FBI.mpsl.elfGet hashmaliciousGafgyt, MiraiBrowse
                          • 176.65.144.18
                          FBI.arm.elfGet hashmaliciousGafgyt, MiraiBrowse
                          • 176.65.144.18
                          FBI.sh4.elfGet hashmaliciousGafgyt, MiraiBrowse
                          • 176.65.144.18
                          FBI.arm7.elfGet hashmaliciousGafgyt, MiraiBrowse
                          • 176.65.144.18
                          FBI.x86.elfGet hashmaliciousGafgyt, MiraiBrowse
                          • 176.65.144.18
                          FBI.mips.elfGet hashmaliciousGafgyt, MiraiBrowse
                          • 176.65.144.18
                          FBI.arm5.elfGet hashmaliciousGafgyt, MiraiBrowse
                          • 176.65.144.18
                          FBI.ppc.elfGet hashmaliciousGafgyt, MiraiBrowse
                          • 176.65.144.18
                          FBI.arm6.elfGet hashmaliciousGafgyt, MiraiBrowse
                          • 176.65.144.18
                          No context
                          No context
                          No created / dropped files found
                          File type:ELF 32-bit LSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, no section header
                          Entropy (8bit):7.94336387591174
                          TrID:
                          • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                          File name:Space.mpsl.elf
                          File size:44'360 bytes
                          MD5:9b4040d5744f5fb2075eb20d95c6cbc8
                          SHA1:debd850e174aa75b033423b26a7afa910afc4823
                          SHA256:d2144c4e57d1c88b22a9be92df490a0b0ce8fade62a7565303b9ec58568d4e13
                          SHA512:bf684e361f6c6b6c92861857dbfa9f218a0846cf640635569e6aa7f1bbd995c9565a7fa98d33db26ac1eb6707477b10d17646f350da343416ef1722fa235b5e5
                          SSDEEP:768:1QdzLFMbXkqyyxwmGFm3qsSPhkj96MiKrecs6cDtyO5XnQDS7Pt+WE:WPmwqBOc31LNrecs6KtPXQDSu
                          TLSH:6313E14D97A1EE15CCCF5839B0CD13B20E92B1C234171FECA3596D8DA865C9ABCC98B1
                          File Content Preview:.ELF........................4...........4. ...(...............................................C...C.....................UPX!d...................V..........?.E.h;....#......b.L#>g7.9f......1....F.....f.u.(L.X.Ak..8......~.Dl0..Wl../... ..il...+..........p?

                          ELF header

                          Class:ELF32
                          Data:2's complement, little endian
                          Version:1 (current)
                          Machine:MIPS R3000
                          Version Number:0x1
                          Type:EXEC (Executable file)
                          OS/ABI:UNIX - System V
                          ABI Version:0
                          Entry Point Address:0x1098e0
                          Flags:0x1007
                          ELF Header Size:52
                          Program Header Offset:52
                          Program Header Size:32
                          Number of Program Headers:2
                          Section Header Offset:0
                          Section Header Size:40
                          Number of Section Headers:0
                          Header String Table Index:0
                          TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                          LOAD0x00x1000000x1000000xac1d0xac1d7.94590x5R E0x10000
                          LOAD0xaffc0x43affc0x43affc0x00x00.00000x6RW 0x10000

                          Download Network PCAP: filteredfull

                          • Total Packets: 32
                          • 3778 undefined
                          • 443 (HTTPS)
                          TimestampSource PortDest PortSource IPDest IP
                          Apr 2, 2025 09:38:32.704842091 CEST427863778192.168.2.14176.65.144.220
                          Apr 2, 2025 09:38:32.908699989 CEST377842786176.65.144.220192.168.2.14
                          Apr 2, 2025 09:38:32.908790112 CEST427863778192.168.2.14176.65.144.220
                          Apr 2, 2025 09:38:32.914948940 CEST427863778192.168.2.14176.65.144.220
                          Apr 2, 2025 09:38:33.121887922 CEST377842786176.65.144.220192.168.2.14
                          Apr 2, 2025 09:38:33.121944904 CEST427863778192.168.2.14176.65.144.220
                          Apr 2, 2025 09:38:33.324448109 CEST377842786176.65.144.220192.168.2.14
                          Apr 2, 2025 09:38:38.322324991 CEST427883778192.168.2.14176.65.144.220
                          Apr 2, 2025 09:38:38.533751965 CEST377842788176.65.144.220192.168.2.14
                          Apr 2, 2025 09:38:38.534250975 CEST427883778192.168.2.14176.65.144.220
                          Apr 2, 2025 09:38:38.557604074 CEST427883778192.168.2.14176.65.144.220
                          Apr 2, 2025 09:38:38.780837059 CEST377842788176.65.144.220192.168.2.14
                          Apr 2, 2025 09:38:38.781893969 CEST427883778192.168.2.14176.65.144.220
                          Apr 2, 2025 09:38:38.983216047 CEST377842788176.65.144.220192.168.2.14
                          Apr 2, 2025 09:38:41.411531925 CEST46540443192.168.2.14185.125.190.26
                          Apr 2, 2025 09:38:42.916915894 CEST427863778192.168.2.14176.65.144.220
                          Apr 2, 2025 09:38:43.121140003 CEST377842786176.65.144.220192.168.2.14
                          Apr 2, 2025 09:38:43.121742010 CEST377842786176.65.144.220192.168.2.14
                          Apr 2, 2025 09:38:43.121814013 CEST427863778192.168.2.14176.65.144.220
                          Apr 2, 2025 09:38:48.565665007 CEST427883778192.168.2.14176.65.144.220
                          Apr 2, 2025 09:38:48.767735958 CEST377842788176.65.144.220192.168.2.14
                          Apr 2, 2025 09:38:48.767862082 CEST377842788176.65.144.220192.168.2.14
                          Apr 2, 2025 09:38:48.768033028 CEST427883778192.168.2.14176.65.144.220
                          Apr 2, 2025 09:38:58.376977921 CEST377842786176.65.144.220192.168.2.14
                          Apr 2, 2025 09:38:58.377238035 CEST427863778192.168.2.14176.65.144.220
                          Apr 2, 2025 09:39:04.009135962 CEST377842788176.65.144.220192.168.2.14
                          Apr 2, 2025 09:39:04.009463072 CEST427883778192.168.2.14176.65.144.220
                          Apr 2, 2025 09:39:12.130496979 CEST46540443192.168.2.14185.125.190.26
                          Apr 2, 2025 09:39:13.580936909 CEST377842786176.65.144.220192.168.2.14
                          Apr 2, 2025 09:39:13.581059933 CEST427863778192.168.2.14176.65.144.220
                          Apr 2, 2025 09:39:19.212961912 CEST377842788176.65.144.220192.168.2.14
                          Apr 2, 2025 09:39:19.213546991 CEST427883778192.168.2.14176.65.144.220
                          Apr 2, 2025 09:39:28.791330099 CEST377842786176.65.144.220192.168.2.14
                          Apr 2, 2025 09:39:28.791594982 CEST427863778192.168.2.14176.65.144.220
                          Apr 2, 2025 09:39:34.419236898 CEST377842788176.65.144.220192.168.2.14
                          Apr 2, 2025 09:39:34.419672966 CEST427883778192.168.2.14176.65.144.220
                          Apr 2, 2025 09:39:43.176218033 CEST427863778192.168.2.14176.65.144.220
                          Apr 2, 2025 09:39:43.380640984 CEST377842786176.65.144.220192.168.2.14
                          Apr 2, 2025 09:39:43.380933046 CEST427863778192.168.2.14176.65.144.220
                          Apr 2, 2025 09:39:48.826143026 CEST427883778192.168.2.14176.65.144.220
                          Apr 2, 2025 09:39:49.026534081 CEST377842788176.65.144.220192.168.2.14
                          Apr 2, 2025 09:39:49.026752949 CEST427883778192.168.2.14176.65.144.220
                          Apr 2, 2025 09:39:58.795898914 CEST377842786176.65.144.220192.168.2.14
                          Apr 2, 2025 09:39:58.796055079 CEST427863778192.168.2.14176.65.144.220
                          Apr 2, 2025 09:40:04.426678896 CEST377842788176.65.144.220192.168.2.14
                          Apr 2, 2025 09:40:04.426851988 CEST427883778192.168.2.14176.65.144.220
                          Apr 2, 2025 09:40:14.001884937 CEST377842786176.65.144.220192.168.2.14
                          Apr 2, 2025 09:40:14.002126932 CEST427863778192.168.2.14176.65.144.220
                          Apr 2, 2025 09:40:19.629504919 CEST377842788176.65.144.220192.168.2.14
                          Apr 2, 2025 09:40:19.629812002 CEST427883778192.168.2.14176.65.144.220
                          Apr 2, 2025 09:40:29.260066032 CEST377842786176.65.144.220192.168.2.14
                          Apr 2, 2025 09:40:29.260251045 CEST427863778192.168.2.14176.65.144.220
                          Apr 2, 2025 09:40:34.834851980 CEST377842788176.65.144.220192.168.2.14
                          Apr 2, 2025 09:40:34.835011959 CEST427883778192.168.2.14176.65.144.220
                          Apr 2, 2025 09:40:43.435894966 CEST427863778192.168.2.14176.65.144.220
                          Apr 2, 2025 09:40:43.642987013 CEST377842786176.65.144.220192.168.2.14
                          Apr 2, 2025 09:40:43.643222094 CEST427863778192.168.2.14176.65.144.220

                          System Behavior

                          Start time (UTC):07:38:31
                          Start date (UTC):02/04/2025
                          Path:/tmp/Space.mpsl.elf
                          Arguments:/tmp/Space.mpsl.elf
                          File size:5773336 bytes
                          MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                          Start time (UTC):07:38:31
                          Start date (UTC):02/04/2025
                          Path:/tmp/Space.mpsl.elf
                          Arguments:-
                          File size:5773336 bytes
                          MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                          Start time (UTC):07:38:31
                          Start date (UTC):02/04/2025
                          Path:/tmp/Space.mpsl.elf
                          Arguments:-
                          File size:5773336 bytes
                          MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                          Start time (UTC):07:38:31
                          Start date (UTC):02/04/2025
                          Path:/tmp/Space.mpsl.elf
                          Arguments:-
                          File size:5773336 bytes
                          MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                          Start time (UTC):07:38:37
                          Start date (UTC):02/04/2025
                          Path:/tmp/Space.mpsl.elf
                          Arguments:-
                          File size:5773336 bytes
                          MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                          Start time (UTC):07:38:37
                          Start date (UTC):02/04/2025
                          Path:/tmp/Space.mpsl.elf
                          Arguments:-
                          File size:5773336 bytes
                          MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9