General
-
Target
sora.arm7.elf
-
Size
47KB
-
Sample
241107-mh8t2a1ale
-
MD5
0ec75f0aa09c3304cfeb73c4306eff78
-
SHA1
bcda7f8716d7e55b0f015e01331fe9a944e2cb42
-
SHA256
7535be55796427859ab481e04adc3b0d048c4996f07694156cd2eb0ca4ccb092
-
SHA512
1b5b31d85283a71d01edeae9dc928fc75d53a947452f1c941157ae56a5b9ee82951c0c064b7578407ba1bc55b4900086dec74174ef68b3dd4b4c2cc532b210ba
-
SSDEEP
768:aK7y1XGO1LCNgukEkvwtqPnH7u83nc0iFR9q3UELWt/iw+kvBGg6+fYtrBH1:E12O1LCNguovDPH7Tcr6LWhiw+kvBGgs
Behavioral task
behavioral1
Sample
sora.arm7.elf
Resource
debian9-armhf-20240418-en
Malware Config
Extracted
mirai
SORA
Targets
-
-
Target
sora.arm7.elf
-
Size
47KB
-
MD5
0ec75f0aa09c3304cfeb73c4306eff78
-
SHA1
bcda7f8716d7e55b0f015e01331fe9a944e2cb42
-
SHA256
7535be55796427859ab481e04adc3b0d048c4996f07694156cd2eb0ca4ccb092
-
SHA512
1b5b31d85283a71d01edeae9dc928fc75d53a947452f1c941157ae56a5b9ee82951c0c064b7578407ba1bc55b4900086dec74174ef68b3dd4b4c2cc532b210ba
-
SSDEEP
768:aK7y1XGO1LCNgukEkvwtqPnH7u83nc0iFR9q3UELWt/iw+kvBGg6+fYtrBH1:E12O1LCNguovDPH7Tcr6LWhiw+kvBGgs
Score10/10-
Mirai family
-
Contacts a large (169625) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-