Malware Analysis Report

2024-11-13 13:12

Sample ID 240804-b4477asdqr
Target a2cd2d709c2df6336aac1653365b48315577ebb0e2673a29b83b190a107e7375.elf
SHA256 a2cd2d709c2df6336aac1653365b48315577ebb0e2673a29b83b190a107e7375
Tags
mirai sora botnet upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

a2cd2d709c2df6336aac1653365b48315577ebb0e2673a29b83b190a107e7375

Threat Level: Known bad

The file a2cd2d709c2df6336aac1653365b48315577ebb0e2673a29b83b190a107e7375.elf was found to be: Known bad.

Malicious Activity Summary

mirai sora botnet upx

Mirai

UPX packed file

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-08-04 01:42

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-08-04 01:42

Reported

2024-08-04 01:45

Platform

debian12-mipsel-20240221-en

Max time kernel

0s

Max time network

7s

Command Line

[/tmp/a2cd2d709c2df6336aac1653365b48315577ebb0e2673a29b83b190a107e7375.elf]

Signatures

Mirai

botnet mirai

Processes

/tmp/a2cd2d709c2df6336aac1653365b48315577ebb0e2673a29b83b190a107e7375.elf

[/tmp/a2cd2d709c2df6336aac1653365b48315577ebb0e2673a29b83b190a107e7375.elf]

Network

Country Destination Domain Proto
US 1.1.1.1:53 debian12-mipsel-20240221-en-4 udp
US 1.1.1.1:53 debian12-mipsel-20240221-en-4 udp
US 1.1.1.1:53 debian12-mipsel-20240221-en-4 udp
US 1.1.1.1:53 debian12-mipsel-20240221-en-4 udp

Files

memory/741-1-0x00400000-0x00455b00-memory.dmp