Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    08/04/2025, 10:12

General

  • Target

    sora.arm7

  • Size

    51KB

  • MD5

    5ec5a41aa4d5a098446854913fcd4f9f

  • SHA1

    0a707b1f22a3a3ff38ed7cd298c07cf883cfeecd

  • SHA256

    f9a08139464b8bcf6f50188bbed184146a99b9c23546356f3603381f72fa4704

  • SHA512

    c4f244d6e274090510c25c31bd3f4a1f0e44c9de3685508d4f65db74d09b07132571faf214ca77169f94c9c6c256f318831dd81bb335fdc820c75f06c2c19828

  • SSDEEP

    1536:oM2bpM0I4Ku0D0aZHBD2NhdLmPqF1aBexo46Lz9Slxp:ozbW0IXDRha9LYqFUPJSlxp

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/sora.arm7
    /tmp/sora.arm7
    1⤵
    • Reads runtime system information
    PID:646

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads