Loading ...

Play interactive tourEdit tour

Linux Analysis Report sora.mpsl

Overview

General Information

Sample Name:sora.mpsl
Analysis ID:519593
MD5:42ac0f5f0fd0d4e42fb7254730e94632
SHA1:12369aa6f5ffd2e251a1e8924eee602b0ef7b2df
SHA256:2dfc8c4568d6a3392fcd4d1837e17d3b4c6a412c8b98bdd91ce91a58250afbca
Tags:Mirai
Infos:

Most interesting Screenshot:

Detection

Mirai
Score:76
Range:0 - 100
Whitelisted:false

Signatures

Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected Mirai
Multi AV Scanner detection for submitted file
Sample is packed with UPX
Uses known network protocols on non-standard ports
Sample tries to kill many processes (SIGKILL)
Sample contains only a LOAD segment without any section mappings
Uses the "uname" system call to query kernel version information (possible evasion)
Enumerates processes within the "proc" file system
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Detected TCP or UDP traffic on non-standard ports
Sample listens on a socket
Sample tries to kill a process (SIGKILL)

Classification

Analysis Advice

Static ELF header machine description suggests that the sample might only run correctly on MIPS or ARM architectures
All HTTP servers contacted by the sample do not answer. Likely the sample is an old dropper which does no longer work
Static ELF header machine description suggests that the sample might not execute correctly on this machine

General Information

Joe Sandbox Version:34.0.0 Boulder Opal
Analysis ID:519593
Start date:10.11.2021
Start time:22:57:03
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 5m 29s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:sora.mpsl
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Detection:MAL
Classification:mal76.spre.troj.evad.linMPSL@0/2@0/0
Warnings:
Show All
  • Report size exceeded maximum capacity and may have missing network information.
  • TCP Packets have been reduced to 100

Process Tree

  • system is lnxubuntu20
  • sora.mpsl (PID: 5240, Parent: 5118, MD5: 0d6f61f82cf2f781c6eb0661071d42d9) Arguments: /tmp/sora.mpsl
  • systemd New Fork (PID: 5279, Parent: 1)
  • sshd (PID: 5279, Parent: 1, MD5: dbca7a6bbf7bf57fedac243d4b2cb340) Arguments: /usr/sbin/sshd -t
  • systemd New Fork (PID: 5280, Parent: 1)
  • sshd (PID: 5280, Parent: 1, MD5: dbca7a6bbf7bf57fedac243d4b2cb340) Arguments: /usr/sbin/sshd -D
  • cleanup

Yara Overview

PCAP (Network Traffic)

SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Mirai_12Yara detected MiraiJoe Security

    Jbx Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Multi AV Scanner detection for submitted fileShow sources
    Source: sora.mpslVirustotal: Detection: 38%Perma Link

    Networking:

    barindex
    Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
    Source: TrafficSnort IDS: 492 INFO TELNET login failed 61.175.221.90:23 -> 192.168.2.23:42040
    Source: TrafficSnort IDS: 492 INFO TELNET login failed 61.175.221.90:23 -> 192.168.2.23:42098
    Source: TrafficSnort IDS: 716 INFO TELNET access 180.65.13.186:23 -> 192.168.2.23:37412
    Source: TrafficSnort IDS: 492 INFO TELNET login failed 61.175.221.90:23 -> 192.168.2.23:42134
    Source: TrafficSnort IDS: 716 INFO TELNET access 132.255.123.219:23 -> 192.168.2.23:50178
    Source: TrafficSnort IDS: 404 ICMP Destination Unreachable Protocol Unreachable 93.167.73.106: -> 192.168.2.23:
    Source: TrafficSnort IDS: 716 INFO TELNET access 132.255.123.219:23 -> 192.168.2.23:50186
    Source: TrafficSnort IDS: 716 INFO TELNET access 118.201.143.166:23 -> 192.168.2.23:44984
    Source: TrafficSnort IDS: 716 INFO TELNET access 132.255.123.219:23 -> 192.168.2.23:50210
    Source: TrafficSnort IDS: 492 INFO TELNET login failed 61.175.221.90:23 -> 192.168.2.23:42174
    Source: TrafficSnort IDS: 492 INFO TELNET login failed 118.201.143.166:23 -> 192.168.2.23:44984
    Source: TrafficSnort IDS: 716 INFO TELNET access 132.255.123.219:23 -> 192.168.2.23:50236
    Source: TrafficSnort IDS: 2023448 ET TROJAN Possible Linux.Mirai Login Attempt (ubnt) 192.168.2.23:36980 -> 220.93.151.186:23
    Source: TrafficSnort IDS: 716 INFO TELNET access 118.201.143.166:23 -> 192.168.2.23:45038
    Source: TrafficSnort IDS: 716 INFO TELNET access 132.255.123.219:23 -> 192.168.2.23:50252
    Source: TrafficSnort IDS: 2023448 ET TROJAN Possible Linux.Mirai Login Attempt (ubnt) 192.168.2.23:50252 -> 132.255.123.219:23
    Source: TrafficSnort IDS: 716 INFO TELNET access 132.255.123.219:23 -> 192.168.2.23:50270
    Source: TrafficSnort IDS: 492 INFO TELNET login failed 118.201.143.166:23 -> 192.168.2.23:45038
    Source: TrafficSnort IDS: 716 INFO TELNET access 132.255.123.219:23 -> 192.168.2.23:50286
    Source: TrafficSnort IDS: 492 INFO TELNET login failed 61.175.221.90:23 -> 192.168.2.23:42244
    Source: TrafficSnort IDS: 716 INFO TELNET access 180.65.13.186:23 -> 192.168.2.23:37550
    Source: TrafficSnort IDS: 716 INFO TELNET access 118.201.143.166:23 -> 192.168.2.23:45094
    Source: TrafficSnort IDS: 716 INFO TELNET access 132.255.123.219:23 -> 192.168.2.23:50300
    Source: TrafficSnort IDS: 492 INFO TELNET login failed 118.201.143.166:23 -> 192.168.2.23:45094
    Source: TrafficSnort IDS: 716 INFO TELNET access 132.255.123.219:23 -> 192.168.2.23:50316
    Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 194.186.52.137:23 -> 192.168.2.23:60396
    Source: TrafficSnort IDS: 492 INFO TELNET login failed 61.175.221.90:23 -> 192.168.2.23:42286
    Source: TrafficSnort IDS: 716 INFO TELNET access 132.255.123.219:23 -> 192.168.2.23:50336
    Source: TrafficSnort IDS: 716 INFO TELNET access 118.201.143.166:23 -> 192.168.2.23:45128
    Source: TrafficSnort IDS: 492 INFO TELNET login failed 118.201.143.166:23 -> 192.168.2.23:45128
    Source: TrafficSnort IDS: 716 INFO TELNET access 118.201.143.166:23 -> 192.168.2.23:45200
    Source: TrafficSnort IDS: 492 INFO TELNET login failed 61.175.221.90:23 -> 192.168.2.23:42372
    Source: TrafficSnort IDS: 492 INFO TELNET login failed 118.201.143.166:23 -> 192.168.2.23:45200
    Source: TrafficSnort IDS: 716 INFO TELNET access 118.201.143.166:23 -> 192.168.2.23:45236
    Source: TrafficSnort IDS: 716 INFO TELNET access 118.69.185.59:23 -> 192.168.2.23:59230
    Source: TrafficSnort IDS: 492 INFO TELNET login failed 118.201.143.166:23 -> 192.168.2.23:45236
    Source: TrafficSnort IDS: 492 INFO TELNET login failed 61.175.221.90:23 -> 192.168.2.23:42406
    Source: TrafficSnort IDS: 716 INFO TELNET access 118.201.143.166:23 -> 192.168.2.23:45248
    Source: TrafficSnort IDS: 716 INFO TELNET access 180.65.13.186:23 -> 192.168.2.23:37724
    Source: TrafficSnort IDS: 492 INFO TELNET login failed 118.201.143.166:23 -> 192.168.2.23:45248
    Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 194.186.52.137:23 -> 192.168.2.23:60618
    Source: TrafficSnort IDS: 492 INFO TELNET login failed 61.175.221.90:23 -> 192.168.2.23:42498
    Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 223.70.241.130:23 -> 192.168.2.23:59070
    Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 223.70.241.130:23 -> 192.168.2.23:59070
    Source: TrafficSnort IDS: 716 INFO TELNET access 118.201.143.166:23 -> 192.168.2.23:45348
    Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 194.186.52.137:23 -> 192.168.2.23:60634
    Source: TrafficSnort IDS: 492 INFO TELNET login failed 118.201.143.166:23 -> 192.168.2.23:45348
    Source: TrafficSnort IDS: 716 INFO TELNET access 118.201.143.166:23 -> 192.168.2.23:45378
    Source: TrafficSnort IDS: 492 INFO TELNET login failed 61.175.221.90:23 -> 192.168.2.23:42554
    Source: TrafficSnort IDS: 492 INFO TELNET login failed 118.201.143.166:23 -> 192.168.2.23:45378
    Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 223.70.241.130:23 -> 192.168.2.23:59138
    Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 223.70.241.130:23 -> 192.168.2.23:59138
    Source: TrafficSnort IDS: 716 INFO TELNET access 118.201.143.166:23 -> 192.168.2.23:45420
    Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 223.70.241.130:23 -> 192.168.2.23:59164
    Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 223.70.241.130:23 -> 192.168.2.23:59164
    Source: TrafficSnort IDS: 492 INFO TELNET login failed 118.201.143.166:23 -> 192.168.2.23:45420
    Source: TrafficSnort IDS: 716 INFO TELNET access 58.185.117.97:23 -> 192.168.2.23:34506
    Source: TrafficSnort IDS: 716 INFO TELNET access 178.45.122.237:23 -> 192.168.2.23:58346
    Source: TrafficSnort IDS: 716 INFO TELNET access 180.65.13.186:23 -> 192.168.2.23:37914
    Source: TrafficSnort IDS: 492 INFO TELNET login failed 58.185.117.97:23 -> 192.168.2.23:34506
    Source: TrafficSnort IDS: 716 INFO TELNET access 178.45.122.237:23 -> 192.168.2.23:58352
    Source: TrafficSnort IDS: 716 INFO TELNET access 218.23.111.163:23 -> 192.168.2.23:35742
    Source: TrafficSnort IDS: 716 INFO TELNET access 218.23.111.163:23 -> 192.168.2.23:35744
    Source: TrafficSnort IDS: 2023448 ET TROJAN Possible Linux.Mirai Login Attempt (ubnt) 192.168.2.23:35744 -> 218.23.111.163:23
    Source: TrafficSnort IDS: 716 INFO TELNET access 58.185.117.97:23 -> 192.168.2.23:34528
    Source: TrafficSnort IDS: 716 INFO TELNET access 218.23.111.163:23 -> 192.168.2.23:35750
    Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 223.70.241.130:23 -> 192.168.2.23:59216
    Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 223.70.241.130:23 -> 192.168.2.23:59216
    Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 194.186.52.137:23 -> 192.168.2.23:60752
    Source: TrafficSnort IDS: 716 INFO TELNET access 218.23.111.163:23 -> 192.168.2.23:35752
    Source: TrafficSnort IDS: 716 INFO TELNET access 178.45.122.237:23 -> 192.168.2.23:58362
    Source: TrafficSnort IDS: 716 INFO TELNET access 218.23.111.163:23 -> 192.168.2.23:35760
    Source: TrafficSnort IDS: 716 INFO TELNET access 218.23.111.163:23 -> 192.168.2.23:35774
    Source: TrafficSnort IDS: 492 INFO TELNET login failed 58.185.117.97:23 -> 192.168.2.23:34528
    Source: TrafficSnort IDS: 716 INFO TELNET access 178.45.122.237:23 -> 192.168.2.23:58392
    Uses known network protocols on non-standard portsShow sources
    Source: unknownNetwork traffic detected: HTTP traffic on port 23 -> 57698
    Source: unknownNetwork traffic detected: HTTP traffic on port 23 -> 57700
    Source: unknownNetwork traffic detected: HTTP traffic on port 23 -> 57704
    Source: unknownNetwork traffic detected: HTTP traffic on port 23 -> 57706
    Source: unknownNetwork traffic detected: HTTP traffic on port 23 -> 57708
    Source: unknownNetwork traffic detected: HTTP traffic on port 23 -> 57710
    Source: unknownNetwork traffic detected: HTTP traffic on port 23 -> 57712
    Source: unknownNetwork traffic detected: HTTP traffic on port 23 -> 57714
    Source: unknownNetwork traffic detected: HTTP traffic on port 23 -> 57716
    Source: unknownNetwork traffic detected: HTTP traffic on port 23 -> 57718
    Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
    Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
    Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
    Source: global trafficTCP traffic: 192.168.2.23:44384 -> 86.126.191.187:1312
    Source: /tmp/sora.mpsl (PID: 5242)Socket: 0.0.0.0::22
    Source: /tmp/sora.mpsl (PID: 5242)Socket: 0.0.0.0::23
    Source: /tmp/sora.mpsl (PID: 5242)Socket: 0.0.0.0::53413
    Source: /tmp/sora.mpsl (PID: 5242)Socket: 0.0.0.0::80
    Source: /tmp/sora.mpsl (PID: 5242)Socket: 0.0.0.0::52869
    Source: /tmp/sora.mpsl (PID: 5242)Socket: 0.0.0.0::37215
    Source: /tmp/sora.mpsl (PID: 5248)Socket: 0.0.0.0::0
    Source: /tmp/sora.mpsl (PID: 5248)Socket: 0.0.0.0::23
    Source: /tmp/sora.mpsl (PID: 5248)Socket: 0.0.0.0::53413
    Source: /tmp/sora.mpsl (PID: 5248)Socket: 0.0.0.0::80
    Source: /tmp/sora.mpsl (PID: 5248)Socket: 0.0.0.0::52869
    Source: /tmp/sora.mpsl (PID: 5248)Socket: 0.0.0.0::37215
    Source: /usr/sbin/sshd (PID: 5280)Socket: [::]::22
    Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443
    Source: unknownTCP traffic detected without corresponding DNS query: 86.126.191.187
    Source: unknownTCP traffic detected without corresponding DNS query: 249.160.168.231
    Source: unknownTCP traffic detected without corresponding DNS query: 18.180.160.250
    Source: unknownTCP traffic detected without corresponding DNS query: 12.64.171.231
    Source: unknownTCP traffic detected without corresponding DNS query: 92.121.112.28
    Source: unknownTCP traffic detected without corresponding DNS query: 206.117.57.130
    Source: unknownTCP traffic detected without corresponding DNS query: 93.243.190.76
    Source: unknownTCP traffic detected without corresponding DNS query: 121.108.199.90
    Source: unknownTCP traffic detected without corresponding DNS query: 60.27.82.21
    Source: unknownTCP traffic detected without corresponding DNS query: 111.7.75.134
    Source: unknownTCP traffic detected without corresponding DNS query: 191.84.217.12
    Source: unknownTCP traffic detected without corresponding DNS query: 209.45.98.211
    Source: unknownTCP traffic detected without corresponding DNS query: 177.209.199.153
    Source: unknownTCP traffic detected without corresponding DNS query: 195.27.80.46
    Source: unknownTCP traffic detected without corresponding DNS query: 58.251.203.2
    Source: unknownTCP traffic detected without corresponding DNS query: 194.158.79.55
    Source: unknownTCP traffic detected without corresponding DNS query: 12.160.167.36
    Source: unknownTCP traffic detected without corresponding DNS query: 173.60.182.205
    Source: unknownTCP traffic detected without corresponding DNS query: 203.174.44.72
    Source: unknownTCP traffic detected without corresponding DNS query: 135.1.203.103
    Source: unknownTCP traffic detected without corresponding DNS query: 107.81.61.103
    Source: unknownTCP traffic detected without corresponding DNS query: 126.38.223.216
    Source: unknownTCP traffic detected without corresponding DNS query: 184.151.29.130
    Source: unknownTCP traffic detected without corresponding DNS query: 159.240.172.93
    Source: unknownTCP traffic detected without corresponding DNS query: 180.124.26.148
    Source: unknownTCP traffic detected without corresponding DNS query: 253.4.69.28
    Source: unknownTCP traffic detected without corresponding DNS query: 80.162.236.135
    Source: unknownTCP traffic detected without corresponding DNS query: 133.222.243.226
    Source: unknownTCP traffic detected without corresponding DNS query: 83.154.22.100
    Source: unknownTCP traffic detected without corresponding DNS query: 96.98.126.158
    Source: unknownTCP traffic detected without corresponding DNS query: 119.75.189.195
    Source: unknownTCP traffic detected without corresponding DNS query: 67.150.155.192
    Source: unknownTCP traffic detected without corresponding DNS query: 38.13.5.54
    Source: unknownTCP traffic detected without corresponding DNS query: 94.247.109.232
    Source: unknownTCP traffic detected without corresponding DNS query: 44.222.35.58
    Source: unknownTCP traffic detected without corresponding DNS query: 154.243.149.241
    Source: unknownTCP traffic detected without corresponding DNS query: 24.164.133.34
    Source: unknownTCP traffic detected without corresponding DNS query: 40.193.239.103
    Source: unknownTCP traffic detected without corresponding DNS query: 112.92.22.39
    Source: unknownTCP traffic detected without corresponding DNS query: 109.145.140.9
    Source: unknownTCP traffic detected without corresponding DNS query: 119.168.43.139
    Source: unknownTCP traffic detected without corresponding DNS query: 178.156.230.210
    Source: unknownTCP traffic detected without corresponding DNS query: 35.219.64.128
    Source: unknownTCP traffic detected without corresponding DNS query: 183.232.45.174
    Source: unknownTCP traffic detected without corresponding DNS query: 78.58.74.90
    Source: unknownTCP traffic detected without corresponding DNS query: 206.162.185.205
    Source: unknownTCP traffic detected without corresponding DNS query: 243.255.16.38
    Source: unknownTCP traffic detected without corresponding DNS query: 13.144.6.193
    Source: unknownTCP traffic detected without corresponding DNS query: 122.80.127.200
    Source: unknownTCP traffic detected without corresponding DNS query: 195.139.152.201
    Source: sora.mpslString found in binary or memory: http://upx.sf.net

    System Summary:

    barindex
    Sample tries to kill many processes (SIGKILL)Show sources
    Source: /tmp/sora.mpsl (PID: 5242)SIGKILL sent: pid: 936, result: successful
    Source: /tmp/sora.mpsl (PID: 5248)SIGKILL sent: pid: 5242, result: successful
    Source: /tmp/sora.mpsl (PID: 5248)SIGKILL sent: pid: 720, result: successful
    Source: /tmp/sora.mpsl (PID: 5248)SIGKILL sent: pid: 759, result: successful
    Source: /tmp/sora.mpsl (PID: 5248)SIGKILL sent: pid: 788, result: successful
    Source: /tmp/sora.mpsl (PID: 5248)SIGKILL sent: pid: 800, result: successful
    Source: /tmp/sora.mpsl (PID: 5248)SIGKILL sent: pid: 847, result: successful
    Source: /tmp/sora.mpsl (PID: 5248)SIGKILL sent: pid: 884, result: successful
    Source: /tmp/sora.mpsl (PID: 5248)SIGKILL sent: pid: 1334, result: successful
    Source: /tmp/sora.mpsl (PID: 5248)SIGKILL sent: pid: 1335, result: successful
    Source: /tmp/sora.mpsl (PID: 5248)SIGKILL sent: pid: 1860, result: successful
    Source: /tmp/sora.mpsl (PID: 5248)SIGKILL sent: pid: 1872, result: successful
    Source: /tmp/sora.mpsl (PID: 5248)SIGKILL sent: pid: 2096, result: successful
    Source: /tmp/sora.mpsl (PID: 5248)SIGKILL sent: pid: 2097, result: successful
    Source: /tmp/sora.mpsl (PID: 5248)SIGKILL sent: pid: 2102, result: successful
    Source: /tmp/sora.mpsl (PID: 5248)SIGKILL sent: pid: 2180, result: successful
    Source: /tmp/sora.mpsl (PID: 5248)SIGKILL sent: pid: 2191, result: successful
    Source: /tmp/sora.mpsl (PID: 5248)SIGKILL sent: pid: 2208, result: successful
    Source: LOAD without section mappingsProgram segment: 0x100000
    Source: /tmp/sora.mpsl (PID: 5242)SIGKILL sent: pid: 936, result: successful
    Source: /tmp/sora.mpsl (PID: 5248)SIGKILL sent: pid: 5242, result: successful
    Source: /tmp/sora.mpsl (PID: 5248)SIGKILL sent: pid: 720, result: successful
    Source: /tmp/sora.mpsl (PID: 5248)SIGKILL sent: pid: 759, result: successful
    Source: /tmp/sora.mpsl (PID: 5248)SIGKILL sent: pid: 788, result: successful
    Source: /tmp/sora.mpsl (PID: 5248)SIGKILL sent: pid: 800, result: successful
    Source: /tmp/sora.mpsl (PID: 5248)SIGKILL sent: pid: 847, result: successful
    Source: /tmp/sora.mpsl (PID: 5248)SIGKILL sent: pid: 884, result: successful
    Source: /tmp/sora.mpsl (PID: 5248)SIGKILL sent: pid: 1334, result: successful
    Source: /tmp/sora.mpsl (PID: 5248)SIGKILL sent: pid: 1335, result: successful
    Source: /tmp/sora.mpsl (PID: 5248)SIGKILL sent: pid: 1860, result: successful
    Source: /tmp/sora.mpsl (PID: 5248)SIGKILL sent: pid: 1872, result: successful
    Source: /tmp/sora.mpsl (PID: 5248)SIGKILL sent: pid: 2096, result: successful
    Source: /tmp/sora.mpsl (PID: 5248)SIGKILL sent: pid: 2097, result: successful
    Source: /tmp/sora.mpsl (PID: 5248)SIGKILL sent: pid: 2102, result: successful
    Source: /tmp/sora.mpsl (PID: 5248)SIGKILL sent: pid: 2180, result: successful
    Source: /tmp/sora.mpsl (PID: 5248)SIGKILL sent: pid: 2191, result: successful
    Source: /tmp/sora.mpsl (PID: 5248)SIGKILL sent: pid: 2208, result: successful
    Source: classification engineClassification label: mal76.spre.troj.evad.linMPSL@0/2@0/0
    Source: sora.mpslJoe Sandbox Cloud Basic: Detection: clean Score: 0Perma Link

    Data Obfuscation:

    barindex
    Sample is packed with UPXShow sources
    Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
    Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
    Source: initial sampleString containing UPX found: $Id: UPX 3.94 Copyright (C) 1996-2017 the UPX Team. All Rights Reserved. $
    Source: /tmp/sora.mpsl (PID: 5242)File opened: /proc/491/fd
    Source: /tmp/sora.mpsl (PID: 5242)File opened: /proc/793/fd
    Source: /tmp/sora.mpsl (PID: 5242)File opened: /proc/772/fd
    Source: /tmp/sora.mpsl (PID: 5242)File opened: /proc/796/fd
    Source: /tmp/sora.mpsl (PID: 5242)File opened: /proc/774/fd
    Source: /tmp/sora.mpsl (PID: 5242)File opened: /proc/797/fd
    Source: /tmp/sora.mpsl (PID: 5242)File opened: /proc/777/fd
    Source: /tmp/sora.mpsl (PID: 5242)File opened: /proc/799/fd
    Source: /tmp/sora.mpsl (PID: 5242)File opened: /proc/658/fd
    Source: /tmp/sora.mpsl (PID: 5242)File opened: /proc/912/fd
    Source: /tmp/sora.mpsl (PID: 5242)File opened: /proc/759/fd
    Source: /tmp/sora.mpsl (PID: 5242)File opened: /proc/936/fd
    Source: /tmp/sora.mpsl (PID: 5242)File opened: /proc/918/fd
    Source: /tmp/sora.mpsl (PID: 5242)File opened: /proc/1/fd
    Source: /tmp/sora.mpsl (PID: 5242)File opened: /proc/761/fd
    Source: /tmp/sora.mpsl (PID: 5242)File opened: /proc/785/fd
    Source: /tmp/sora.mpsl (PID: 5242)File opened: /proc/884/fd
    Source: /tmp/sora.mpsl (PID: 5242)File opened: /proc/720/fd
    Source: /tmp/sora.mpsl (PID: 5242)File opened: /proc/721/fd
    Source: /tmp/sora.mpsl (PID: 5242)File opened: /proc/788/fd
    Source: /tmp/sora.mpsl (PID: 5242)File opened: /proc/789/fd
    Source: /tmp/sora.mpsl (PID: 5242)File opened: /proc/800/fd
    Source: /tmp/sora.mpsl (PID: 5242)File opened: /proc/801/fd
    Source: /tmp/sora.mpsl (PID: 5242)File opened: /proc/847/fd
    Source: /tmp/sora.mpsl (PID: 5242)File opened: /proc/904/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/5264/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/5265/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/5266/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/5267/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/5268/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/2033/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/2033/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/2033/exe
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/1582/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/1582/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/1582/exe
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/2275/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/2275/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/1612/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/1612/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/1612/exe
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/1579/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/1579/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/1579/exe
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/1699/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/1699/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/1699/exe
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/1335/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/1335/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/1335/exe
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/1698/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/1698/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/1698/exe
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/2028/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/2028/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/2028/exe
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/1334/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/1334/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/1334/exe
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/1576/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/1576/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/1576/exe
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/2302/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/2302/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/3236/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/3236/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/2025/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/2025/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/2025/exe
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/2146/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/2146/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/2146/exe
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/910/exe
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/912/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/912/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/912/exe
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/759/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/759/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/759/exe
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/517/exe
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/2307/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/2307/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/918/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/918/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/918/exe
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/5272/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/5273/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/5274/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/5275/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/5276/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/5277/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/5278/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/1594/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/1594/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/1594/exe
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/2285/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/2285/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/2281/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/2281/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/5270/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/5271/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/1349/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/1349/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/1349/exe
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/1/fd
    Source: /tmp/sora.mpsl (PID: 5248)File opened: /proc/1/fd

    Hooking and other Techniques for Hiding and Protection:

    barindex
    Uses known network protocols on non-standard portsShow sources
    Source: unknownNetwork traffic detected: HTTP traffic on port 23 -> 57698
    Source: unknownNetwork traffic detected: HTTP traffic on port 23 -> 57700
    Source: unknownNetwork traffic detected: HTTP traffic on port 23 -> 57704
    Source: unknownNetwork traffic detected: HTTP traffic on port 23 -> 57706
    Source: unknownNetwork traffic detected: HTTP traffic on port 23 -> 57708
    Source: unknownNetwork traffic detected: HTTP traffic on port 23 -> 57710
    Source: unknownNetwork traffic detected: HTTP traffic on port 23 -> 57712
    Source: unknownNetwork traffic detected: HTTP traffic on port 23 -> 57714
    Source: unknownNetwork traffic detected: HTTP traffic on port 23 -> 57716
    Source: unknownNetwork traffic detected: HTTP traffic on port 23 -> 57718
    Source: /tmp/sora.mpsl (PID: 5240)Queries kernel information via 'uname':
    Source: sora.mpsl, 5240.1.000000001907c40d.00000000de767c9a.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/mipsel
    Source: sora.mpsl, 5240.1.00000000d8e57db9.000000003c3a8a7a.rw-.sdmpBinary or memory string: Yx86_64/usr/bin/qemu-mipsel/tmp/sora.mpslSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/sora.mpsl
    Source: sora.mpsl, 5240.1.000000001907c40d.00000000de767c9a.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/mipsel
    Source: sora.mpsl, 5240.1.00000000d8e57db9.000000003c3a8a7a.rw-.sdmpBinary or memory string: /usr/bin/qemu-mipsel

    Stealing of Sensitive Information:

    barindex
    Yara detected MiraiShow sources
    Source: Yara matchFile source: dump.pcap, type: PCAP

    Remote Access Functionality:

    barindex
    Yara detected MiraiShow sources
    Source: Yara matchFile source: dump.pcap, type: PCAP

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionObfuscated Files or Information1OS Credential Dumping1Security Software Discovery11Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Standard Port11Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data

    Malware Configuration

    No configs have been found

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Number of created Files
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 519593 Sample: sora.mpsl Startdate: 10/11/2021 Architecture: LINUX Score: 76 28 156.100.80.142 XNSTGCA United States 2->28 30 209.92.8.169 WINDSTREAMUS United States 2->30 32 98 other IPs or domains 2->32 36 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->36 38 Multi AV Scanner detection for submitted file 2->38 40 Yara detected Mirai 2->40 42 2 other signatures 2->42 8 sora.mpsl 2->8         started        10 systemd sshd 2->10         started        12 systemd sshd 2->12         started        signatures3 process4 process5 14 sora.mpsl 8->14         started        16 sora.mpsl 8->16         started        19 sora.mpsl 8->19         started        signatures6 21 sora.mpsl 14->21         started        24 sora.mpsl 14->24         started        26 sora.mpsl 14->26         started        34 Sample tries to kill many processes (SIGKILL) 16->34 process7 signatures8 44 Sample tries to kill many processes (SIGKILL) 21->44

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    sora.mpsl39%VirustotalBrowse

    Dropped Files

    No Antivirus matches

    Domains

    No Antivirus matches

    URLs

    No Antivirus matches

    Domains and IPs

    Contacted Domains

    No contacted domains info

    URLs from Memory and Binaries

    NameSourceMaliciousAntivirus DetectionReputation
    http://upx.sf.netsora.mpslfalse
      high

      Contacted IPs

      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs

      Public

      IPDomainCountryFlagASNASN NameMalicious
      148.57.98.39
      unknownUnited States
      10753LVLT-10753USfalse
      36.63.232.128
      unknownChina
      4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
      178.166.17.66
      unknownPortugal
      12353VODAFONE-PTVodafonePortugalPTfalse
      94.42.249.28
      unknownPoland
      5588GTSCEGTSCentralEuropeAntelGermanyCZfalse
      121.215.93.53
      unknownAustralia
      1221ASN-TELSTRATelstraCorporationLtdAUfalse
      240.46.153.198
      unknownReserved
      unknownunknownfalse
      202.126.161.125
      unknownHong Kong
      4637ASN-TELSTRA-GLOBALTelstraGlobalHKfalse
      111.0.17.150
      unknownChina
      56041CMNET-ZHEJIANG-APChinaMobilecommunicationscorporationCfalse
      108.152.25.20
      unknownUnited States
      16509AMAZON-02USfalse
      141.205.80.8
      unknownUnited States
      797AMERITECH-ASUSfalse
      98.99.70.119
      unknownUnited States
      62566STARBUCKSUSfalse
      156.100.80.142
      unknownUnited States
      393504XNSTGCAfalse
      123.231.123.165
      unknownSri Lanka
      18001DIALOG-ASDialogAxiataPLCLKfalse
      35.29.173.243
      unknownUnited States
      36375UMICH-AS-5USfalse
      108.17.85.21
      unknownUnited States
      701UUNETUSfalse
      222.226.56.23
      unknownJapan2516KDDIKDDICORPORATIONJPfalse
      94.62.51.199
      unknownPortugal
      12353VODAFONE-PTVodafonePortugalPTfalse
      148.129.11.201
      unknownUnited States
      7764CENSUSBUREAUUSfalse
      60.156.131.216
      unknownJapan17676GIGAINFRASoftbankBBCorpJPfalse
      14.172.125.75
      unknownViet Nam
      45899VNPT-AS-VNVNPTCorpVNfalse
      66.170.46.96
      unknownUnited States
      16698BRIGHTNETUSfalse
      121.98.221.38
      unknownNew Zealand
      9790VOCUSGROUPNZVocusGroupNZfalse
      44.80.188.194
      unknownUnited States
      7377UCSDUSfalse
      78.74.7.68
      unknownSweden
      3301TELIANET-SWEDENTeliaCompanySEfalse
      85.220.9.229
      unknownIceland
      6677ICENET-AS1ISfalse
      79.149.221.198
      unknownSpain
      3352TELEFONICA_DE_ESPANAESfalse
      116.31.232.129
      unknownChina
      4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
      209.92.8.169
      unknownUnited States
      7029WINDSTREAMUSfalse
      88.196.160.49
      unknownEstonia
      3249ESTPAKEEfalse
      165.104.225.187
      unknownUnited States
      26305ASN-SSMUSfalse
      204.120.93.14
      unknownUnited States
      1239SPRINTLINKUSfalse
      112.93.141.60
      unknownChina
      17816CHINA169-GZChinaUnicomIPnetworkChina169Guangdongprovifalse
      94.191.99.99
      unknownChina
      45090CNNIC-TENCENT-NET-APShenzhenTencentComputerSystemsCompafalse
      94.63.199.231
      unknownPortugal
      12353VODAFONE-PTVodafonePortugalPTfalse
      54.103.47.111
      unknownUnited States
      16509AMAZON-02USfalse
      160.38.70.93
      unknownUnited Kingdom
      3450UTKUSfalse
      68.54.35.217
      unknownUnited States
      7922COMCAST-7922USfalse
      202.65.72.220
      unknownAustralia
      38195SUPERLOOP-AS-APSuperloopAUfalse
      1.45.25.239
      unknownChina
      45083CHEERYZONEBeijingCheeryZoneScitechCoLtdCNfalse
      166.64.126.168
      unknownAustralia
      58681NSWPOLSERV-AS-APNewSouthWalesPoliceAUfalse
      12.92.121.112
      unknownUnited States
      7018ATT-INTERNET4USfalse
      112.125.161.208
      unknownChina
      37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdfalse
      39.176.217.227
      unknownChina
      9808CMNET-GDGuangdongMobileCommunicationCoLtdCNfalse
      218.119.166.110
      unknownJapan17676GIGAINFRASoftbankBBCorpJPfalse
      109.126.60.17
      unknownRussian Federation
      42038VLADLINK-ASRUfalse
      14.44.138.222
      unknownKorea Republic of
      4766KIXS-AS-KRKoreaTelecomKRfalse
      104.230.253.69
      unknownUnited States
      10796TWC-10796-MIDWESTUSfalse
      177.87.59.184
      unknownBrazil
      262648BRAVATELECOMUNICACOESPONTESELACERDALTDA-EPPBRfalse
      217.22.110.113
      unknownSpain
      15711IBERDROLABilbaoESfalse
      47.87.41.39
      unknownUnited States
      3209VODANETInternationalIP-BackboneofVodafoneDEfalse
      65.66.253.159
      unknownUnited States
      7018ATT-INTERNET4USfalse
      112.96.183.188
      unknownChina
      17622CNCGROUP-GZChinaUnicomGuangzhounetworkCNfalse
      102.136.132.185
      unknownCote D'ivoire
      36974AFNET-ASCIfalse
      255.117.137.5
      unknownReserved
      unknownunknownfalse
      242.184.151.122
      unknownReserved
      unknownunknownfalse
      74.252.191.113
      unknownUnited States
      6389BELLSOUTH-NET-BLKUSfalse
      188.95.165.168
      unknownSaudi Arabia
      34397CYBERIA-RUHCyberiaRiyadhAutonomousSystemSAfalse
      191.237.129.95
      unknownBrazil
      8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
      146.234.19.249
      unknownGermany
      43857FRAPORTDEfalse
      9.211.168.137
      unknownUnited States
      3356LEVEL3USfalse
      66.242.157.205
      unknownUnited States
      13649ASN-VINSUSfalse
      252.201.180.233
      unknownReserved
      unknownunknownfalse
      146.153.203.105
      unknownUnited States
      197938TRAVIANGAMESDEfalse
      149.119.110.167
      unknownUnited States
      11872SYRACUSE-UNIVERSITYUSfalse
      85.138.67.230
      unknownPortugal
      2860NOS_COMUNICACOESPTfalse
      191.80.153.165
      unknownArgentina
      22927TelefonicadeArgentinaARfalse
      116.204.165.44
      unknownPakistan
      23607LEONET-AS-APLeoNetPvtLtdPKfalse
      5.101.107.41
      unknownNetherlands
      14061DIGITALOCEAN-ASNUSfalse
      221.83.33.106
      unknownJapan17676GIGAINFRASoftbankBBCorpJPfalse
      24.71.77.191
      unknownCanada
      6327SHAWCAfalse
      193.252.45.35
      unknownFrance
      3215FranceTelecom-OrangeFRfalse
      32.93.232.170
      unknownUnited States
      2686ATGS-MMD-ASUSfalse
      243.100.129.203
      unknownReserved
      unknownunknownfalse
      57.24.98.110
      unknownBelgium
      2686ATGS-MMD-ASUSfalse
      117.159.243.74
      unknownChina
      24445CMNET-V4HENAN-AS-APHenanMobileCommunicationsCoLtdCNfalse
      247.209.69.255
      unknownReserved
      unknownunknownfalse
      160.247.147.135
      unknownJapan2907SINET-ASResearchOrganizationofInformationandSystemsNfalse
      93.126.14.252
      unknownIran (ISLAMIC Republic Of)
      44375AISDPIRfalse
      190.95.251.255
      unknownEcuador
      27947TelconetSAECfalse
      62.222.102.220
      unknownIreland
      8918CARRIER1-ASIEfalse
      178.161.16.206
      unknownKuwait
      42961GPRS-ASZAINKWfalse
      89.246.41.40
      unknownGermany
      8881VERSATELDEfalse
      78.122.64.184
      unknownFrance
      8228CEGETEL-ASFRfalse
      23.68.48.214
      unknownUnited States
      7922COMCAST-7922USfalse
      65.133.167.221
      unknownUnited States
      209CENTURYLINK-US-LEGACY-QWESTUSfalse
      164.137.70.99
      unknownUnited Kingdom
      3303SWISSCOMSwisscomSwitzerlandLtdCHfalse
      253.163.201.162
      unknownReserved
      unknownunknownfalse
      101.79.180.5
      unknownKorea Republic of
      38661HCLC-AS-KRpurplestonesKRfalse
      208.98.29.101
      unknownUnited States
      46844ST-BGPUSfalse
      254.148.39.84
      unknownReserved
      unknownunknownfalse
      198.164.10.40
      unknownCanada
      395431IGTCANSOLCAfalse
      183.183.7.155
      unknownJapan45684MIRAINETKyoceraCommunicationSystemsCoLtdJPfalse
      146.12.254.26
      unknownUnited States
      197938TRAVIANGAMESDEfalse
      199.45.249.232
      unknownUnited States
      16618FUC-AS-16618USfalse
      35.145.114.33
      unknownUnited States
      394141ROCKET-FIBERUSfalse
      63.154.17.178
      unknownUnited States
      209CENTURYLINK-US-LEGACY-QWESTUSfalse
      118.117.199.51
      unknownChina
      139220CHINANET-SICHUAN-CHUANXI-IDCSichuanChuanxnIDCCNfalse
      223.179.12.206
      unknownIndia
      45609BHARTI-MOBILITY-AS-APBhartiAirtelLtdASforGPRSServicefalse
      204.25.184.75
      unknownUnited States
      13325STOMIUSfalse
      158.30.134.23
      unknownUnited States
      1504DNIC-AS-01504USfalse


      Runtime Messages

      Command:/tmp/sora.mpsl
      Exit Code:0
      Exit Code Info:
      Killed:False
      Standard Output:
      Connected To CNC
      Standard Error:

      Joe Sandbox View / Context

      IPs

      No context

      Domains

      No context

      ASN

      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      CHINANET-BACKBONENo31Jin-rongStreetCNl0vNaPgd6fGet hashmaliciousBrowse
      • 106.82.51.213
      8fVDxGRR8SGet hashmaliciousBrowse
      • 121.234.206.186
      s36oh8I6I0Get hashmaliciousBrowse
      • 59.48.199.216
      3ObdCtrussGet hashmaliciousBrowse
      • 117.77.54.225
      uRQVqbl0sQGet hashmaliciousBrowse
      • 125.123.119.138
      63BjZ1IcIhGet hashmaliciousBrowse
      • 1.193.195.217
      trynagetmybinsufucker98575.arm7Get hashmaliciousBrowse
      • 183.151.71.1
      m-p.s-l.SakuraGet hashmaliciousBrowse
      • 125.89.54.95
      QXFOZ3CshcGet hashmaliciousBrowse
      • 222.168.38.12
      sora.x86Get hashmaliciousBrowse
      • 113.77.117.207
      sora.arm7Get hashmaliciousBrowse
      • 182.98.40.207
      sora.armGet hashmaliciousBrowse
      • 182.244.34.68
      lDawzTbABcGet hashmaliciousBrowse
      • 1.71.43.54
      DVHEnaPp2dGet hashmaliciousBrowse
      • 119.126.143.146
      HwcNrhNfZgGet hashmaliciousBrowse
      • 27.185.59.72
      X5bKvoLX1EGet hashmaliciousBrowse
      • 42.203.201.215
      e9e6i5D2gKGet hashmaliciousBrowse
      • 115.217.129.91
      19kG57P043Get hashmaliciousBrowse
      • 123.175.36.144
      Smlp3eBtOIGet hashmaliciousBrowse
      • 118.122.17.150
      eGH4d5FDoUGet hashmaliciousBrowse
      • 27.28.94.97
      LVLT-10753USKod7jprn7K.exeGet hashmaliciousBrowse
      • 193.56.146.64
      44508.5578762732.dat.dllGet hashmaliciousBrowse
      • 193.56.146.60
      setup_x86_x64_install.exeGet hashmaliciousBrowse
      • 193.56.146.36
      2LG87UfOTH.exeGet hashmaliciousBrowse
      • 193.56.146.64
      0A223AA68AF0C2AF0BAABDA61D82748629078720A017E.exeGet hashmaliciousBrowse
      • 193.56.146.36
      951049989EB772C71EC4FA9F0685AB45CAE755CA5D34C.exeGet hashmaliciousBrowse
      • 193.56.146.36
      C9DE02209482359466292BE7BC0464FC65037698B38C1.exeGet hashmaliciousBrowse
      • 193.56.146.36
      setup_installer.exeGet hashmaliciousBrowse
      • 193.56.146.36
      CB7D321954760DE22CCBF59ECE43D94E503350B18203D.exeGet hashmaliciousBrowse
      • 193.56.146.36
      D1F610AF3C46FFF6C857BE0136C696604EB8E7466B4A7.exeGet hashmaliciousBrowse
      • 193.56.146.36
      F1F6AEEE9A42004E68765A83E9CBD51BC878A0AFD7C80.exeGet hashmaliciousBrowse
      • 193.56.146.36
      4Lkdxnkt9M.exeGet hashmaliciousBrowse
      • 193.56.146.64
      22275B7C5A57111ACA919F6BBFAE171E5E99F5EF777D1.exeGet hashmaliciousBrowse
      • 193.56.146.36
      4AE186F9A645695962B47F37C8B8E64C4D45F2B2A12AE.exeGet hashmaliciousBrowse
      • 193.56.146.36
      O4eFetVyO4.exeGet hashmaliciousBrowse
      • 193.56.146.36
      6PjJy5iOgU.exeGet hashmaliciousBrowse
      • 193.56.146.36
      2FA81F4A4C64E5595C5D538062B4E8435E10FCCD9F81B.exeGet hashmaliciousBrowse
      • 193.56.146.36
      t2E05q13ox.exeGet hashmaliciousBrowse
      • 193.56.146.64
      I3O28Z5uqy.exeGet hashmaliciousBrowse
      • 193.56.146.64
      Hf34l6qunJ.exeGet hashmaliciousBrowse
      • 193.56.146.64

      JA3 Fingerprints

      No context

      Dropped Files

      No context

      Created / dropped Files

      /proc/5280/oom_score_adj
      Process:/usr/sbin/sshd
      File Type:ASCII text
      Category:dropped
      Size (bytes):6
      Entropy (8bit):1.7924812503605778
      Encrypted:false
      SSDEEP:3:ptn:Dn
      MD5:CBF282CC55ED0792C33D10003D1F760A
      SHA1:007DD8BD75468E6B7ABA4285E9B267202C7EAEED
      SHA-256:FCDBAB99FCC0F4409E5F9D7D6FC497780288B4C441698126BB62832412774D22
      SHA-512:4643A8675D213C7DA35CC0C2BFB3B6F20324F9C48AEA7BA79F470615698C9A0CEFDA45CAA1957FC29110EE746BC8458AB8AB1E43EB513912A5E1E8858812CC00
      Malicious:false
      Reputation:high, very likely benign file
      Preview: -1000.
      /run/sshd.pid
      Process:/usr/sbin/sshd
      File Type:ASCII text
      Category:dropped
      Size (bytes):5
      Entropy (8bit):2.321928094887362
      Encrypted:false
      SSDEEP:3:C/:C/
      MD5:0FB51AB07BECFCF5B764E59B0957E47B
      SHA1:07616041CD80AD91C6AA10FF67BFEBA563B7C869
      SHA-256:FB1A28528DCFF52E97348E800604313D3E228AAA6AE947D7204F6C1512A5DEC2
      SHA-512:25A69A478FB7B9E63A3748FCE192E292B14EF021A0ACBACAAAE672B7FCC04C41957EFC2177DF13CEB84B7A33D577913477A57CAAD949B49EA0A06C8B00789C0C
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview: 5280.

      Static File Info

      General

      File type:ELF 32-bit LSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, stripped
      Entropy (8bit):7.879578898375912
      TrID:
      • ELF Executable and Linkable format (generic) (4004/1) 100.00%
      File name:sora.mpsl
      File size:27236
      MD5:42ac0f5f0fd0d4e42fb7254730e94632
      SHA1:12369aa6f5ffd2e251a1e8924eee602b0ef7b2df
      SHA256:2dfc8c4568d6a3392fcd4d1837e17d3b4c6a412c8b98bdd91ce91a58250afbca
      SHA512:76e5a2ba9a9576f3bedb6d2fcbef73e6b042471f5c8f537c99e1b43726ef32182eef1b69c29cd960b0ce1cb41f7fb8e0e10aecb27b7d3dcbe3a39367ccf58ae0
      SSDEEP:768:w9CUFskb2JgIs/E2+OocrfJiHNjfmQ2q7IoqdBhUWx:GCrJgHiOJrfwmQrctpj
      File Content Preview:.ELF.....................V..4...........4. ...(.....................=i..=i....................E...E....................tUPX!`.......T...T.......T..........?.E.h;....#......b.L#4E..,,....M..D{c....j;.D .A....~.....hE.:.O........L..N.7g..\....R.............

      Static ELF Info

      ELF header

      Class:ELF32
      Data:2's complement, little endian
      Version:1 (current)
      Machine:MIPS R3000
      Version Number:0x1
      Type:EXEC (Executable file)
      OS/ABI:UNIX - System V
      ABI Version:0
      Entry Point Address:0x105600
      Flags:0x1007
      ELF Header Size:52
      Program Header Offset:52
      Program Header Size:32
      Number of Program Headers:2
      Section Header Offset:0
      Section Header Size:40
      Number of Section Headers:0
      Header String Table Index:0

      Program Segments

      TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
      LOAD0x00x1000000x1000000x693d0x693d4.20690x5R E0x10000
      LOAD0x18c00x4518c00x4518c00x00x00.00000x6RW 0x10000

      Network Behavior

      Network Port Distribution

      TCP Packets

      TimestampSource PortDest PortSource IPDest IP
      Nov 10, 2021 22:57:48.125638008 CET443841312192.168.2.2386.126.191.187
      Nov 10, 2021 22:57:48.164361000 CET3351323192.168.2.23249.160.168.231
      Nov 10, 2021 22:57:48.164433956 CET3351323192.168.2.2318.180.160.250
      Nov 10, 2021 22:57:48.164437056 CET3351323192.168.2.2312.64.171.231
      Nov 10, 2021 22:57:48.164460897 CET3351323192.168.2.2392.121.112.28
      Nov 10, 2021 22:57:48.164472103 CET3351323192.168.2.23206.117.57.130
      Nov 10, 2021 22:57:48.164536953 CET3351323192.168.2.2393.243.190.76
      Nov 10, 2021 22:57:48.164541960 CET3351323192.168.2.23121.108.199.90
      Nov 10, 2021 22:57:48.164551973 CET3351323192.168.2.2360.27.82.21
      Nov 10, 2021 22:57:48.164563894 CET3351323192.168.2.23111.7.75.134
      Nov 10, 2021 22:57:48.164604902 CET3351323192.168.2.23191.84.217.12
      Nov 10, 2021 22:57:48.164613008 CET3351323192.168.2.23209.45.98.211
      Nov 10, 2021 22:57:48.164628029 CET3351323192.168.2.23177.209.199.153
      Nov 10, 2021 22:57:48.164633036 CET3351323192.168.2.23195.27.80.46
      Nov 10, 2021 22:57:48.164638042 CET3351323192.168.2.2358.251.203.2
      Nov 10, 2021 22:57:48.164643049 CET3351323192.168.2.23194.158.79.55
      Nov 10, 2021 22:57:48.164645910 CET3351323192.168.2.2312.160.167.36
      Nov 10, 2021 22:57:48.164654970 CET3351323192.168.2.23173.60.182.205
      Nov 10, 2021 22:57:48.164686918 CET3351323192.168.2.23203.174.44.72
      Nov 10, 2021 22:57:48.164688110 CET3351323192.168.2.23135.1.203.103
      Nov 10, 2021 22:57:48.164696932 CET3351323192.168.2.23107.81.61.103
      Nov 10, 2021 22:57:48.164705038 CET3351323192.168.2.23126.38.223.216
      Nov 10, 2021 22:57:48.164719105 CET3351323192.168.2.23184.151.29.130
      Nov 10, 2021 22:57:48.164727926 CET3351323192.168.2.23159.240.172.93
      Nov 10, 2021 22:57:48.164727926 CET3351323192.168.2.23180.124.26.148
      Nov 10, 2021 22:57:48.164748907 CET3351323192.168.2.23253.4.69.28
      Nov 10, 2021 22:57:48.164766073 CET3351323192.168.2.2380.162.236.135
      Nov 10, 2021 22:57:48.164836884 CET3351323192.168.2.23133.222.243.226
      Nov 10, 2021 22:57:48.164838076 CET3351323192.168.2.2383.154.22.100
      Nov 10, 2021 22:57:48.164841890 CET3351323192.168.2.2396.98.126.158
      Nov 10, 2021 22:57:48.164859056 CET3351323192.168.2.23119.75.189.195
      Nov 10, 2021 22:57:48.164864063 CET3351323192.168.2.2367.150.155.192
      Nov 10, 2021 22:57:48.164868116 CET3351323192.168.2.2338.13.5.54
      Nov 10, 2021 22:57:48.164870977 CET3351323192.168.2.2394.247.109.232
      Nov 10, 2021 22:57:48.164877892 CET3351323192.168.2.2344.222.35.58
      Nov 10, 2021 22:57:48.164885044 CET3351323192.168.2.23154.243.149.241
      Nov 10, 2021 22:57:48.164887905 CET3351323192.168.2.2324.164.133.34
      Nov 10, 2021 22:57:48.164891958 CET3351323192.168.2.2340.193.239.103
      Nov 10, 2021 22:57:48.164891005 CET3351323192.168.2.23112.92.22.39
      Nov 10, 2021 22:57:48.164899111 CET3351323192.168.2.23109.145.140.9
      Nov 10, 2021 22:57:48.164900064 CET3351323192.168.2.23119.168.43.139
      Nov 10, 2021 22:57:48.164905071 CET3351323192.168.2.23178.156.230.210
      Nov 10, 2021 22:57:48.164910078 CET3351323192.168.2.2335.219.64.128
      Nov 10, 2021 22:57:48.164911985 CET3351323192.168.2.23183.232.45.174
      Nov 10, 2021 22:57:48.164925098 CET3351323192.168.2.2378.58.74.90
      Nov 10, 2021 22:57:48.164927959 CET3351323192.168.2.23206.162.185.205
      Nov 10, 2021 22:57:48.164948940 CET3351323192.168.2.23243.255.16.38
      Nov 10, 2021 22:57:48.164951086 CET3351323192.168.2.2313.144.6.193
      Nov 10, 2021 22:57:48.164963007 CET3351323192.168.2.23122.80.127.200
      Nov 10, 2021 22:57:48.164962053 CET3351323192.168.2.23195.139.152.201
      Nov 10, 2021 22:57:48.164974928 CET3351323192.168.2.23148.42.189.150
      Nov 10, 2021 22:57:48.164974928 CET3351323192.168.2.23139.225.46.28
      Nov 10, 2021 22:57:48.164975882 CET3351323192.168.2.23218.11.101.179
      Nov 10, 2021 22:57:48.164983034 CET3351323192.168.2.23244.92.160.177
      Nov 10, 2021 22:57:48.165016890 CET3351323192.168.2.23158.124.4.205
      Nov 10, 2021 22:57:48.165035963 CET3351323192.168.2.2382.132.90.111
      Nov 10, 2021 22:57:48.165043116 CET3351323192.168.2.23247.5.112.121
      Nov 10, 2021 22:57:48.165055990 CET3351323192.168.2.2384.169.170.163
      Nov 10, 2021 22:57:48.165076971 CET3351323192.168.2.2398.230.144.165
      Nov 10, 2021 22:57:48.165081024 CET3351323192.168.2.23165.82.2.228
      Nov 10, 2021 22:57:48.165122032 CET3351323192.168.2.2370.183.237.50
      Nov 10, 2021 22:57:48.165133953 CET3351323192.168.2.23183.17.119.27
      Nov 10, 2021 22:57:48.165146112 CET3351323192.168.2.23247.231.1.26
      Nov 10, 2021 22:57:48.165154934 CET3351323192.168.2.23121.219.62.180
      Nov 10, 2021 22:57:48.165162086 CET3351323192.168.2.23109.227.166.253
      Nov 10, 2021 22:57:48.165167093 CET3351323192.168.2.23176.204.99.147
      Nov 10, 2021 22:57:48.165177107 CET3351323192.168.2.23245.69.54.137
      Nov 10, 2021 22:57:48.165194035 CET3351323192.168.2.23101.44.231.244
      Nov 10, 2021 22:57:48.165308952 CET3351323192.168.2.2369.8.79.170
      Nov 10, 2021 22:57:48.165308952 CET3351323192.168.2.23153.251.232.35
      Nov 10, 2021 22:57:48.165340900 CET3351323192.168.2.2368.36.139.172
      Nov 10, 2021 22:57:48.165347099 CET3351323192.168.2.23166.72.61.128
      Nov 10, 2021 22:57:48.165354967 CET3351323192.168.2.23120.178.45.232
      Nov 10, 2021 22:57:48.165369034 CET3351323192.168.2.23135.147.136.19
      Nov 10, 2021 22:57:48.165369987 CET3351323192.168.2.238.207.13.45
      Nov 10, 2021 22:57:48.165379047 CET3351323192.168.2.2391.253.255.35
      Nov 10, 2021 22:57:48.165384054 CET3351323192.168.2.23139.225.50.239
      Nov 10, 2021 22:57:48.165386915 CET3351323192.168.2.2312.254.76.201
      Nov 10, 2021 22:57:48.165390015 CET3351323192.168.2.23194.70.115.65
      Nov 10, 2021 22:57:48.165393114 CET3351323192.168.2.23115.110.153.215
      Nov 10, 2021 22:57:48.165410042 CET3351323192.168.2.23167.57.59.213
      Nov 10, 2021 22:57:48.165433884 CET3351323192.168.2.2387.182.234.103
      Nov 10, 2021 22:57:48.165452003 CET3351323192.168.2.2391.110.181.13
      Nov 10, 2021 22:57:48.165482998 CET3351323192.168.2.2360.0.23.223
      Nov 10, 2021 22:57:48.165493011 CET3351323192.168.2.23169.166.155.25
      Nov 10, 2021 22:57:48.165543079 CET3351323192.168.2.2372.8.22.99
      Nov 10, 2021 22:57:48.165587902 CET3351323192.168.2.23175.108.140.248
      Nov 10, 2021 22:57:48.165590048 CET3351323192.168.2.23160.202.60.48
      Nov 10, 2021 22:57:48.165591002 CET3351323192.168.2.2341.37.15.82
      Nov 10, 2021 22:57:48.165595055 CET3351323192.168.2.23197.237.130.70
      Nov 10, 2021 22:57:48.165596962 CET3351323192.168.2.23202.153.155.219
      Nov 10, 2021 22:57:48.165600061 CET3351323192.168.2.23167.121.128.163
      Nov 10, 2021 22:57:48.165601015 CET3351323192.168.2.2385.132.69.150
      Nov 10, 2021 22:57:48.165606022 CET3351323192.168.2.23216.190.134.189
      Nov 10, 2021 22:57:48.165606976 CET3351323192.168.2.2370.159.150.154
      Nov 10, 2021 22:57:48.165617943 CET3351323192.168.2.2382.30.54.46
      Nov 10, 2021 22:57:48.165627956 CET3351323192.168.2.23155.159.192.22
      Nov 10, 2021 22:57:48.165633917 CET3351323192.168.2.2344.6.0.163
      Nov 10, 2021 22:57:48.165688992 CET3351323192.168.2.23245.94.65.66
      Nov 10, 2021 22:57:48.165700912 CET3351323192.168.2.2359.3.240.30

      System Behavior

      General

      Start time:22:57:46
      Start date:10/11/2021
      Path:/tmp/sora.mpsl
      Arguments:/tmp/sora.mpsl
      File size:5773336 bytes
      MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

      General

      Start time:22:57:47
      Start date:10/11/2021
      Path:/tmp/sora.mpsl
      Arguments:n/a
      File size:5773336 bytes
      MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

      General

      Start time:22:57:47
      Start date:10/11/2021
      Path:/tmp/sora.mpsl
      Arguments:n/a
      File size:5773336 bytes
      MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

      General

      Start time:22:57:47
      Start date:10/11/2021
      Path:/tmp/sora.mpsl
      Arguments:n/a
      File size:5773336 bytes
      MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

      General

      Start time:22:57:47
      Start date:10/11/2021
      Path:/tmp/sora.mpsl
      Arguments:n/a
      File size:5773336 bytes
      MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

      General

      Start time:22:57:47
      Start date:10/11/2021
      Path:/tmp/sora.mpsl
      Arguments:n/a
      File size:5773336 bytes
      MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

      General

      Start time:22:57:47
      Start date:10/11/2021
      Path:/tmp/sora.mpsl
      Arguments:n/a
      File size:5773336 bytes
      MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

      General

      Start time:22:58:02
      Start date:10/11/2021
      Path:/usr/lib/systemd/systemd
      Arguments:n/a
      File size:1620224 bytes
      MD5 hash:9b2bec7092a40488108543f9334aab75

      General

      Start time:22:58:02
      Start date:10/11/2021
      Path:/usr/sbin/sshd
      Arguments:/usr/sbin/sshd -t
      File size:876328 bytes
      MD5 hash:dbca7a6bbf7bf57fedac243d4b2cb340

      General

      Start time:22:58:02
      Start date:10/11/2021
      Path:/usr/lib/systemd/systemd
      Arguments:n/a
      File size:1620224 bytes
      MD5 hash:9b2bec7092a40488108543f9334aab75

      General

      Start time:22:58:02
      Start date:10/11/2021
      Path:/usr/sbin/sshd
      Arguments:/usr/sbin/sshd -D
      File size:876328 bytes
      MD5 hash:dbca7a6bbf7bf57fedac243d4b2cb340