General

  • Target

    sora.arm7.elf

  • Size

    51KB

  • Sample

    230428-r76heseg38

  • MD5

    6bb11b787e5ad3bc45472a71e4681644

  • SHA1

    d1b11ee6bd0729fc1c73388966835e8722e86905

  • SHA256

    abf212c68b7569b1d84605c60dbce3bfe82618a667e8e17667a3d10ea3a95e45

  • SHA512

    40070a4e4fdfbeb9b9c1c2598ac7bc78055233665ec5e679ccb0f6c40e51c4422cb002cefe59afb1e68cb0bdde68a832b7c7fcbb3d7ca75fa980e986d4f49693

  • SSDEEP

    1536:j9O/ZMAXIxNUk0sLcPqF1aBexo4opKZbm:j9O/ZNKyILGqFUFj

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Targets

    • Target

      sora.arm7.elf

    • Size

      51KB

    • MD5

      6bb11b787e5ad3bc45472a71e4681644

    • SHA1

      d1b11ee6bd0729fc1c73388966835e8722e86905

    • SHA256

      abf212c68b7569b1d84605c60dbce3bfe82618a667e8e17667a3d10ea3a95e45

    • SHA512

      40070a4e4fdfbeb9b9c1c2598ac7bc78055233665ec5e679ccb0f6c40e51c4422cb002cefe59afb1e68cb0bdde68a832b7c7fcbb3d7ca75fa980e986d4f49693

    • SSDEEP

      1536:j9O/ZMAXIxNUk0sLcPqF1aBexo4opKZbm:j9O/ZNKyILGqFUFj

    Score
    10/10
    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Changes its process name

    • Reads runtime system information

      Reads data from /proc virtual filesystem.

MITRE ATT&CK Matrix

Tasks