General
-
Target
sora.mpsl.elf
-
Size
29KB
-
Sample
250215-3wt6ss1ndt
-
MD5
4212601df2895b69f9531fd2eb28d098
-
SHA1
8cf1acb18fbb58d09d8d7eed13695d4089ab8672
-
SHA256
c50ef064cbca534104e9a89a41d03ef5a08962ea408ebf20825b6065655ee098
-
SHA512
b09ca66df7c5f3f3796d944fd79d4494bfcbe18e2b9195f656ce3e1e79d4042c9c7900f841955f17c781c3494e466691f5c6b92d3d04bbf66dbdea8223da8659
-
SSDEEP
768:V1uUtLrVDsAp6tLEzZ+G29y5TW3AFLFxJbCWUY:VbDs06tAzkP9ITW3ABGY
Behavioral task
behavioral1
Sample
sora.mpsl.elf
Resource
debian12-mipsel-20240221-en
Malware Config
Extracted
mirai
SORA
Targets
-
-
Target
sora.mpsl.elf
-
Size
29KB
-
MD5
4212601df2895b69f9531fd2eb28d098
-
SHA1
8cf1acb18fbb58d09d8d7eed13695d4089ab8672
-
SHA256
c50ef064cbca534104e9a89a41d03ef5a08962ea408ebf20825b6065655ee098
-
SHA512
b09ca66df7c5f3f3796d944fd79d4494bfcbe18e2b9195f656ce3e1e79d4042c9c7900f841955f17c781c3494e466691f5c6b92d3d04bbf66dbdea8223da8659
-
SSDEEP
768:V1uUtLrVDsAp6tLEzZ+G29y5TW3AFLFxJbCWUY:VbDs06tAzkP9ITW3ABGY
Score10/10-
Mirai family
-
Contacts a large (48365) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-