Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240418-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    30-06-2024 06:53

General

  • Target

    sora.arm5.elf

  • Size

    23KB

  • MD5

    329d06ba90ae1f8f3da8ad86de4d383b

  • SHA1

    1d141ae1b74fce6c86d71f68889607f3c86dcd4f

  • SHA256

    26165890581ef9edec41424036962fb4037cdd4a6783a1830a564d5152f4956a

  • SHA512

    8643037371d229619628a16800c85216836f7ff636305c22d1fd67e44935b517e44ea80feefdcf4733f435cc2e2440054128cbbeffe7f5a4a95c85d260272307

  • SSDEEP

    384:4GHKXlJIDFUS0Mggks3aIrokYV1IEQ0Sx2qRI4MaaWphymdGUop5hu7m:4GHKQFH0rs3zl924Ls3UozM7m

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

Processes

  • /tmp/sora.arm5.elf
    /tmp/sora.arm5.elf
    1⤵
      PID:652

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/652-1-0x00008000-0x0001e9e8-memory.dmp