Analysis

  • max time kernel
    1s
  • max time network
    129s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20221125-en
  • resource tags

    arch:armhfimage:debian9-armhf-20221125-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    30/06/2023, 15:51

General

  • Target

    sora.arm7.elf

  • Size

    51KB

  • MD5

    b867e2d2172417b94c6b9c03d58e592e

  • SHA1

    f9d587bdb8586a31891bc49dcdaadd2b47cf228c

  • SHA256

    bb4b23d43c87a72fac09ce824b1d578a64cd36f3d68d8de97fbb0fdbb5348075

  • SHA512

    f9ae84a1415696a7be84bf162f3bac740285c2bf34e6e06dbf3c49e2a030eafb2800cd905e2eaf127198ff9b71c7d9929f39a2668d909fd071c88876febdb2a6

  • SSDEEP

    768:LLbPpQwNueqlA/gS8wgXFuCAIDRFLoBcoDz9q3UELjCHVIpH3UQJc2ZVYCYjK0N4:r+wg7A/ww96jomLm1IpXVJc21+3onv

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/sora.arm7.elf
    /tmp/sora.arm7.elf
    1⤵
    • Reads runtime system information
    PID:360

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads