General

  • Target

    sora.arm7.elf

  • Size

    172KB

  • MD5

    aef8dc1889a6ddbd7a85f3581b6ec0f7

  • SHA1

    6c9ec432aceeb584a1510f0c3471b2af241dea53

  • SHA256

    32609491a6cba85b03b29902f773cf820690d93a675a8ba223287abf088b832f

  • SHA512

    7f835ee681624208edadc65df4a5411793700fc9f05612e31a3dfded05b6173c2fc3416b8f9c1f39bac8638212311f447862006263580047a76b113861c31e1c

  • SSDEEP

    3072:wgYZqims1FFRHoLmpMguHcUHVUHalw7WguH0qsfCjeGmjXL2zbpzaIajtFVMikCD:wgYZqimsbFRHoLmpMguHcUHVUHalw7WC

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Contains strings common to LOLSquad DDoS tools 1 IoCs

    Resembles a range of public tools written in C intended for DDoS attacks.

  • Mirai family

Files

  • sora.arm7.elf
    .elf linux arm