General
-
Target
sora.arm7.elf
-
Size
50KB
-
Sample
250221-r89lgatqhn
-
MD5
c35aa445d978e350a2fc77ecb70cce84
-
SHA1
ae8b2ff8182d4180cc23f348d20c09fb6e04a4e4
-
SHA256
769ac938767ce381ccf9c162d88bb09875aa403b857fbadca85e37a5ad51304c
-
SHA512
f905d7b746b92b6a502c8882abeb3f43ece0bce48a2746033b8504e7fe1bd8e56a4454b5e778dc46bd503355d13d31f612fdc41bf650740ff8fc67e75c31f34d
-
SSDEEP
1536:uCoqsGR4eB3g0Vmh1IxIpC8JCL9VE8amFZP7R3v:Xoqs2Twh6P8JCLJ9ZP7R3v
Behavioral task
behavioral1
Sample
sora.arm7.elf
Resource
debian9-armhf-20240611-en
Malware Config
Extracted
mirai
SORA
Targets
-
-
Target
sora.arm7.elf
-
Size
50KB
-
MD5
c35aa445d978e350a2fc77ecb70cce84
-
SHA1
ae8b2ff8182d4180cc23f348d20c09fb6e04a4e4
-
SHA256
769ac938767ce381ccf9c162d88bb09875aa403b857fbadca85e37a5ad51304c
-
SHA512
f905d7b746b92b6a502c8882abeb3f43ece0bce48a2746033b8504e7fe1bd8e56a4454b5e778dc46bd503355d13d31f612fdc41bf650740ff8fc67e75c31f34d
-
SSDEEP
1536:uCoqsGR4eB3g0Vmh1IxIpC8JCL9VE8amFZP7R3v:Xoqs2Twh6P8JCLJ9ZP7R3v
Score10/10-
Mirai family
-
Contacts a large (145492) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-