General
-
Target
sora.arm7.elf
-
Size
50KB
-
Sample
241123-sk6qcatkdr
-
MD5
5999375900f84bedc2a4cff2608bf3b4
-
SHA1
4ab454bacb94d0953a9f431f7e2fbf50fb37e332
-
SHA256
bf80ca576e99af76d8e36ede2dddfef2849d2ccd59ac0f15ea2d21c6562f2441
-
SHA512
e19fcdbd1232538f3e2bc1701f693c2681c9b787fcac1c50315781576b2dc0e13805aa41c4a679e8883eb382b24e6a96099d5a24942f9ee15046075fc251eba2
-
SSDEEP
768:CfZYvZxNZ/SPjiUv0w0zyIvfgJy2LHRfbwuwY9q3UEL2qEK5J6OAsNTGjf2tl8X9:tPtQjiZVcykHRDqBL15J6RN2tA9
Behavioral task
behavioral1
Sample
sora.arm7.elf
Resource
debian9-armhf-20240611-en
Malware Config
Extracted
mirai
SORA
Targets
-
-
Target
sora.arm7.elf
-
Size
50KB
-
MD5
5999375900f84bedc2a4cff2608bf3b4
-
SHA1
4ab454bacb94d0953a9f431f7e2fbf50fb37e332
-
SHA256
bf80ca576e99af76d8e36ede2dddfef2849d2ccd59ac0f15ea2d21c6562f2441
-
SHA512
e19fcdbd1232538f3e2bc1701f693c2681c9b787fcac1c50315781576b2dc0e13805aa41c4a679e8883eb382b24e6a96099d5a24942f9ee15046075fc251eba2
-
SSDEEP
768:CfZYvZxNZ/SPjiUv0w0zyIvfgJy2LHRfbwuwY9q3UEL2qEK5J6OAsNTGjf2tl8X9:tPtQjiZVcykHRDqBL15J6RN2tA9
Score10/10-
Mirai family
-
Contacts a large (168361) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-