Analysis

  • max time kernel
    124s
  • max time network
    146s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20240611-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    08/04/2025, 10:13

General

  • Target

    sora.mips

  • Size

    28KB

  • MD5

    c665be249de8aacbf7f020710556850f

  • SHA1

    7bf15fe8983c1a7304ecb626385fd8d656657750

  • SHA256

    c70c7d6288ddd3de1e999fef3e15a4cb7d23656de44209d834ea08c97f26f2c3

  • SHA512

    2125eacc929f9f6ab5232960153e3a3c2d554cd3f65fa7fb97324a275ce27034621999f2922aaa2a4beeeda75d09b2ff89aab6417e2f93329f56ce2529cd14d8

  • SSDEEP

    768:9Yva6tyRjdLVM1ZnRMy6gidymlShZtYAH1n/HJgGlzDpbuR1JI:9YvZtyRphMPRDid0pHHRtVJuG

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Contacts a large (39921) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Changes its process name 1 IoCs
  • Reads runtime system information 20 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 1 IoCs

    Adversaries may gather information about the network configuration of a system.

Processes

  • /tmp/sora.mips
    /tmp/sora.mips
    1⤵
    • Modifies Watchdog functionality
    • Changes its process name
    • Reads runtime system information
    • System Network Configuration Discovery
    PID:698

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads