General
-
Target
sora.mpsl.elf
-
Size
43KB
-
Sample
250221-r5r71stqbn
-
MD5
1f995a68ebaaac17db62b7ad84318e63
-
SHA1
58d59e800176b32ba21403bc59fff2ebd3881cb5
-
SHA256
f6856b008d4992a82cb6fea48e957d5ab215687c575f510c1c58f76713a0d56b
-
SHA512
3d2bc7154a2ad26f20b068883f2cf16ff3b1e9c42c6406f99e67daeed75a52ba8f4af234c7a97fad1a2654c9ca219dfc225d528513f49635153bb423f67bb925
-
SSDEEP
768:jqCDkRxeGVeVke8QCTBWl4XMYSGl2U2D04VTkU2yWNedxaKQf:+mGTBM4uGUcUQUxFo
Behavioral task
behavioral1
Sample
sora.mpsl.elf
Resource
debian9-mipsel-20240226-en
Malware Config
Extracted
mirai
SORA
Targets
-
-
Target
sora.mpsl.elf
-
Size
43KB
-
MD5
1f995a68ebaaac17db62b7ad84318e63
-
SHA1
58d59e800176b32ba21403bc59fff2ebd3881cb5
-
SHA256
f6856b008d4992a82cb6fea48e957d5ab215687c575f510c1c58f76713a0d56b
-
SHA512
3d2bc7154a2ad26f20b068883f2cf16ff3b1e9c42c6406f99e67daeed75a52ba8f4af234c7a97fad1a2654c9ca219dfc225d528513f49635153bb423f67bb925
-
SSDEEP
768:jqCDkRxeGVeVke8QCTBWl4XMYSGl2U2D04VTkU2yWNedxaKQf:+mGTBM4uGUcUQUxFo
Score10/10-
Mirai family
-
Contacts a large (39044) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-