General

  • Target

    sora.mpsl.elf

  • Size

    43KB

  • Sample

    250221-r5r71stqbn

  • MD5

    1f995a68ebaaac17db62b7ad84318e63

  • SHA1

    58d59e800176b32ba21403bc59fff2ebd3881cb5

  • SHA256

    f6856b008d4992a82cb6fea48e957d5ab215687c575f510c1c58f76713a0d56b

  • SHA512

    3d2bc7154a2ad26f20b068883f2cf16ff3b1e9c42c6406f99e67daeed75a52ba8f4af234c7a97fad1a2654c9ca219dfc225d528513f49635153bb423f67bb925

  • SSDEEP

    768:jqCDkRxeGVeVke8QCTBWl4XMYSGl2U2D04VTkU2yWNedxaKQf:+mGTBM4uGUcUQUxFo

Malware Config

Extracted

Family

mirai

Botnet

SORA

Targets

    • Target

      sora.mpsl.elf

    • Size

      43KB

    • MD5

      1f995a68ebaaac17db62b7ad84318e63

    • SHA1

      58d59e800176b32ba21403bc59fff2ebd3881cb5

    • SHA256

      f6856b008d4992a82cb6fea48e957d5ab215687c575f510c1c58f76713a0d56b

    • SHA512

      3d2bc7154a2ad26f20b068883f2cf16ff3b1e9c42c6406f99e67daeed75a52ba8f4af234c7a97fad1a2654c9ca219dfc225d528513f49635153bb423f67bb925

    • SSDEEP

      768:jqCDkRxeGVeVke8QCTBWl4XMYSGl2U2D04VTkU2yWNedxaKQf:+mGTBM4uGUcUQUxFo

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • Contacts a large (39044) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks