General
-
Target
sora.mpsl.elf
-
Size
26KB
-
Sample
241107-l2rt7azjgs
-
MD5
b975d1767c59a10f7471daf3e14433f7
-
SHA1
110f6bf7678b582d8eb51ec5ef62420eeed69bbc
-
SHA256
0806569feb0ee3a03613b02bed83bfd8a148e6406d44649f49bcf7778f5abe47
-
SHA512
62b43f0c9fe3c319574c1abc46b31bf05d5f5b729cc79a7508ec57fcbc93ae152927dcbc32980acaa75963730f5ed21f03073712767e89841e8379b4eb75df27
-
SSDEEP
768:MuCUFskb2JgIs/E2+OocrfJiHNjfmQ2q7IoqdBFuW5:5CrJgHiOJrfwmQrcttl
Behavioral task
behavioral1
Sample
sora.mpsl.elf
Resource
debian9-mipsel-20240611-en
Malware Config
Extracted
mirai
SORA
Targets
-
-
Target
sora.mpsl.elf
-
Size
26KB
-
MD5
b975d1767c59a10f7471daf3e14433f7
-
SHA1
110f6bf7678b582d8eb51ec5ef62420eeed69bbc
-
SHA256
0806569feb0ee3a03613b02bed83bfd8a148e6406d44649f49bcf7778f5abe47
-
SHA512
62b43f0c9fe3c319574c1abc46b31bf05d5f5b729cc79a7508ec57fcbc93ae152927dcbc32980acaa75963730f5ed21f03073712767e89841e8379b4eb75df27
-
SSDEEP
768:MuCUFskb2JgIs/E2+OocrfJiHNjfmQ2q7IoqdBFuW5:5CrJgHiOJrfwmQrcttl
Score10/10-
Mirai family
-
Contacts a large (109487) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-