General
-
Target
sora.mpsl.elf
-
Size
29KB
-
Sample
241103-ry6f3awjdt
-
MD5
37985e467c817bf15d6c9e390912c1cd
-
SHA1
9fb09e4378ddb3a1aed647e05e9601afa82e2997
-
SHA256
71bfd13866b7e055503b28c236fa93520c32e8d4e7bc517b367479597c2136d7
-
SHA512
201c660365bdcd5e04395fbdf53e6d5eb3e0239962aaaabc853a5ce5f3ed3b3a4d9da748f8d9a5e9d0b52a9810f5789a84a06cda1ccedc669ce2a74dce83bcbb
-
SSDEEP
768:EUMbYiXNplakzb6LljVRYG8sJOkR7ZOEX2uo1Oz6llhyCWUs:lMbRNpljwBqwJOKdOEXm1Tyks
Behavioral task
behavioral1
Sample
sora.mpsl.elf
Resource
debian12-mipsel-20240418-en
Malware Config
Extracted
mirai
SORA
Targets
-
-
Target
sora.mpsl.elf
-
Size
29KB
-
MD5
37985e467c817bf15d6c9e390912c1cd
-
SHA1
9fb09e4378ddb3a1aed647e05e9601afa82e2997
-
SHA256
71bfd13866b7e055503b28c236fa93520c32e8d4e7bc517b367479597c2136d7
-
SHA512
201c660365bdcd5e04395fbdf53e6d5eb3e0239962aaaabc853a5ce5f3ed3b3a4d9da748f8d9a5e9d0b52a9810f5789a84a06cda1ccedc669ce2a74dce83bcbb
-
SSDEEP
768:EUMbYiXNplakzb6LljVRYG8sJOkR7ZOEX2uo1Oz6llhyCWUs:lMbRNpljwBqwJOKdOEXm1Tyks
Score10/10-
Mirai family
-
Contacts a large (49195) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-