General
-
Target
sora.mpsl.elf
-
Size
115KB
-
Sample
241111-trclhsvjej
-
MD5
778507ecdcad45e9df4cf23e313d7f07
-
SHA1
78f95c2087ede31eca55407e454a7595ec58d185
-
SHA256
b8f28a459204f5e9ba65fe67e6cc38c1c242763c76e166983039f2cdccdbadf7
-
SHA512
9f191d9115800e86f02bb66151bbb5aaa469ae693ea62034a7fdb870bccd5c7e9474804bef098effba3e16b24e775d8b8a64025aa84967a9b9000bbb369c1cec
-
SSDEEP
1536:MdyRfyxiqiSf7A1SsdALwsvPTPaXf2TjGMYqlub1gwZJ6im9SKCVD5X:MkRoiqiO9sdpRbql61gwgq5X
Behavioral task
behavioral1
Sample
sora.mpsl.elf
Resource
debian9-mipsel-20240729-en
Malware Config
Extracted
mirai
SORA
Targets
-
-
Target
sora.mpsl.elf
-
Size
115KB
-
MD5
778507ecdcad45e9df4cf23e313d7f07
-
SHA1
78f95c2087ede31eca55407e454a7595ec58d185
-
SHA256
b8f28a459204f5e9ba65fe67e6cc38c1c242763c76e166983039f2cdccdbadf7
-
SHA512
9f191d9115800e86f02bb66151bbb5aaa469ae693ea62034a7fdb870bccd5c7e9474804bef098effba3e16b24e775d8b8a64025aa84967a9b9000bbb369c1cec
-
SSDEEP
1536:MdyRfyxiqiSf7A1SsdALwsvPTPaXf2TjGMYqlub1gwZJ6im9SKCVD5X:MkRoiqiO9sdpRbql61gwgq5X
Score9/10-
Contacts a large (49551) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-