{
	"id": "d406546b-c87a-42a2-80f6-1d7c51903050",
	"created_at": "2026-04-06T00:08:08.722702Z",
	"updated_at": "2026-04-10T03:20:38.583893Z",
	"deleted_at": null,
	"sha1_hash": "57ce54e74c197fe19570ea78fa9380e16f7319dd",
	"title": "Analyzing a Backdoor/Bot for the MIPS Platform",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 30336,
	"plain_text": "Analyzing a Backdoor/Bot for the MIPS Platform\r\nBy Created by:Muhammad Junaid Bohio\r\nArchived: 2026-04-05 17:26:34 UTC\r\nMalware functionalities have been evolving and so are their target platforms and architectures. Non-PC appliances\r\nof different architectures have not traditionally been frequent targets of malware. However, many of those\r\nappliances, due to their enhanced processing power and/or low maintenance, provide ideal targets for malware.\r\nMoreover, due to the lack of security for home routers, they often remain infected until replaced, thereby\r\nproviding longer persistence for a malware. Recently, there has been a surge in malware for the MIPS and ARM\r\narchitectures, targeting specific routers, DVRs, and other appliances. These network devices, in comparison, get\r\nless focus from vulnerability researchers and firmware patch application by end-users. This increases the risk of\r\ncompromise and requires additional skills to cope with malware exploiting these platforms. This paper discusses\r\nvarious tools and techniques for reversing malware for the MIPS platform. We perform static and dynamic\r\nanalysis of a MIPS malware, discuss its Command and Control mechanism, and provide detection of its network\r\ncommunication.\r\nSource: https://www.sans.org/reading-room/whitepapers/malicious/analyzing-backdoor-bot-mips-platform-35902\r\nhttps://www.sans.org/reading-room/whitepapers/malicious/analyzing-backdoor-bot-mips-platform-35902\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"references": [
		"https://www.sans.org/reading-room/whitepapers/malicious/analyzing-backdoor-bot-mips-platform-35902"
	],
	"report_names": [
		"analyzing-backdoor-bot-mips-platform-35902"
	],
	"threat_actors": [],
	"ts_created_at": 1775434088,
	"ts_updated_at": 1775791238,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/57ce54e74c197fe19570ea78fa9380e16f7319dd.pdf",
		"text": "https://archive.orkl.eu/57ce54e74c197fe19570ea78fa9380e16f7319dd.txt",
		"img": "https://archive.orkl.eu/57ce54e74c197fe19570ea78fa9380e16f7319dd.jpg"
	}
}