General
-
Target
sora.mips.elf
-
Size
115KB
-
Sample
241111-q8ntbszejr
-
MD5
4231011fc93eb6cee664c8f6e98c9deb
-
SHA1
5c6b28947ab354c3d2116e248b05aa81cd03e4c4
-
SHA256
cfbcd0fe73d6a9719e68ca5dde1eec634c6d5ae2c3e91087bacb4e572d01e8a8
-
SHA512
d1ba0ea58779fbf02c7df826030dcf384fefbe25d96038ac55c301746433ff7212a863d26a0e91426182e620c2362fa33e1ce8f2cf8a43ae1a9af20a6e72eb2e
-
SSDEEP
3072:IIbwb8sK3O30za2qZXY4JMVpJVlMYrac/:IYg8senCZXY4JMV7zP/
Behavioral task
behavioral1
Sample
sora.mips.elf
Resource
debian9-mipsbe-20240418-en
Malware Config
Extracted
mirai
SORA
Targets
-
-
Target
sora.mips.elf
-
Size
115KB
-
MD5
4231011fc93eb6cee664c8f6e98c9deb
-
SHA1
5c6b28947ab354c3d2116e248b05aa81cd03e4c4
-
SHA256
cfbcd0fe73d6a9719e68ca5dde1eec634c6d5ae2c3e91087bacb4e572d01e8a8
-
SHA512
d1ba0ea58779fbf02c7df826030dcf384fefbe25d96038ac55c301746433ff7212a863d26a0e91426182e620c2362fa33e1ce8f2cf8a43ae1a9af20a6e72eb2e
-
SSDEEP
3072:IIbwb8sK3O30za2qZXY4JMVpJVlMYrac/:IYg8senCZXY4JMV7zP/
Score9/10-
Contacts a large (39821) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-