General

  • Target

    sora.mpsl.elf

  • Size

    26KB

  • Sample

    241107-l2rt7azjgs

  • MD5

    b975d1767c59a10f7471daf3e14433f7

  • SHA1

    110f6bf7678b582d8eb51ec5ef62420eeed69bbc

  • SHA256

    0806569feb0ee3a03613b02bed83bfd8a148e6406d44649f49bcf7778f5abe47

  • SHA512

    62b43f0c9fe3c319574c1abc46b31bf05d5f5b729cc79a7508ec57fcbc93ae152927dcbc32980acaa75963730f5ed21f03073712767e89841e8379b4eb75df27

  • SSDEEP

    768:MuCUFskb2JgIs/E2+OocrfJiHNjfmQ2q7IoqdBFuW5:5CrJgHiOJrfwmQrcttl

Malware Config

Extracted

Family

mirai

Botnet

SORA

Targets

    • Target

      sora.mpsl.elf

    • Size

      26KB

    • MD5

      b975d1767c59a10f7471daf3e14433f7

    • SHA1

      110f6bf7678b582d8eb51ec5ef62420eeed69bbc

    • SHA256

      0806569feb0ee3a03613b02bed83bfd8a148e6406d44649f49bcf7778f5abe47

    • SHA512

      62b43f0c9fe3c319574c1abc46b31bf05d5f5b729cc79a7508ec57fcbc93ae152927dcbc32980acaa75963730f5ed21f03073712767e89841e8379b4eb75df27

    • SSDEEP

      768:MuCUFskb2JgIs/E2+OocrfJiHNjfmQ2q7IoqdBFuW5:5CrJgHiOJrfwmQrcttl

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • Contacts a large (109487) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

MITRE ATT&CK Enterprise v15

Tasks