General

  • Target

    sora.x86.elf

  • Size

    39KB

  • Sample

    250221-r3m6aatpfp

  • MD5

    235f97612c47939069192857071b1241

  • SHA1

    eebd627248c3074a04a4a590f9cfe52c61da4edd

  • SHA256

    e8d833074c1359dc035ec53009be474e276ffa95154b95c14d643d934b4d521d

  • SHA512

    9e409b0968573673ff4d060ba5d846a197ca24c9a9bb0d30e445733971706bd9cd9e472ec1922f64530122f5818054aa2b2cd161c74a3d8e160e16f5f1ade7c5

  • SSDEEP

    768:sWRsr0BsMXlZu60wyvvt8SFl8Gkfe45ZjMqxLu2+YZvlJ1dYV:sWugBs6Qayvv/l8GmrZjMqxL8YBlpW

Malware Config

Extracted

Family

mirai

Botnet

SORA

Targets

    • Target

      sora.x86.elf

    • Size

      39KB

    • MD5

      235f97612c47939069192857071b1241

    • SHA1

      eebd627248c3074a04a4a590f9cfe52c61da4edd

    • SHA256

      e8d833074c1359dc035ec53009be474e276ffa95154b95c14d643d934b4d521d

    • SHA512

      9e409b0968573673ff4d060ba5d846a197ca24c9a9bb0d30e445733971706bd9cd9e472ec1922f64530122f5818054aa2b2cd161c74a3d8e160e16f5f1ade7c5

    • SSDEEP

      768:sWRsr0BsMXlZu60wyvvt8SFl8Gkfe45ZjMqxLu2+YZvlJ1dYV:sWugBs6Qayvv/l8GmrZjMqxL8YBlpW

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • Contacts a large (76600) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks