| File name: | sora.arm7 |
| Full analysis: | https://app.any.run/tasks/c8b076b5-4a90-42cb-8128-3a7690113ec1 |
| Verdict: | Malicious activity |
| Analysis date: | October 03, 2025, 17:37:42 |
| OS: | Debian 12.2 |
| Indicators: | |
| MIME: | application/x-executable |
| File info: | ELF 32-bit LSB executable, ARM, EABI4 version 1 (SYSV), statically linked, with debug_info, not stripped |
| MD5: | 3D27CACA75855FDCD14FAE40BAA67FD2 |
| SHA1: | B23D5CF58C71103E3935823CA2434D4A32D41060 |
| SHA256: | 8AC95425B0E37CB44BAFF04E531D2F059D4935143A040B046351A0BE05021C72 |
| SSDEEP: | 3072:P+SYHpczjcZNirKPniECUXfngM/iPggSa/kP:YmiNWKPniECUXfgM/iPgO/kP |
| .o | | | ELF Executable and Linkable format (generic) (100) |
|---|
| CPUArchitecture: | 32 bit |
|---|---|
| CPUByteOrder: | Little endian |
| ObjectFileType: | Executable file |
| CPUType: | Arm (up to Armv7/AArch32) |
PID | CMD | Path | Indicators | Parent process |
|---|---|---|---|---|
| 2140 | /bin/sh -c "sudo chown user /tmp/sora\.arm7\.elf && chmod +x /tmp/sora\.arm7\.elf && DISPLAY=:0 sudo -iu user /tmp/sora\.arm7\.elf " | /usr/bin/dash | — | any-guest-agent |
User: root Integrity Level: UNKNOWN Exit code: 0 | ||||
| 2141 | sudo chown user /tmp/sora.arm7.elf | /usr/bin/sudo | — | dash |
User: root Integrity Level: UNKNOWN Exit code: 0 | ||||
| 2142 | chown user /tmp/sora.arm7.elf | /usr/bin/chown | — | sudo |
User: root Integrity Level: UNKNOWN Exit code: 0 | ||||
| 2143 | chmod +x /tmp/sora.arm7.elf | /usr/bin/chmod | — | dash |
User: root Integrity Level: UNKNOWN Exit code: 0 | ||||
| 2144 | sudo -iu user /tmp/sora.arm7.elf | /usr/bin/sudo | — | dash |
User: root Integrity Level: UNKNOWN Exit code: 0 | ||||
| 2147 | /tmp/sora.arm7.elf | /tmp/sora.arm7.elf | — | sudo |
User: user Integrity Level: UNKNOWN Exit code: 0 | ||||
| 2148 | id -u | /usr/bin/id | — | sora.arm7.elf |
User: user Integrity Level: UNKNOWN Exit code: 0 | ||||
| 2151 | kjf3d40ia1boopf13g | /tmp/sora.arm7.elf | — | sora.arm7.elf |
User: user Integrity Level: UNKNOWN Exit code: 0 | ||||
| 2152 | kjf3d40ia1boopf13g | /tmp/sora.arm7.elf | — | sora.arm7.elf |
User: user Integrity Level: UNKNOWN Exit code: 0 | ||||
| 2153 | kjf3d40ia1boopf13g | /tmp/sora.arm7.elf | sora.arm7.elf | |
User: user Integrity Level: UNKNOWN Exit code: 0 | ||||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
481 | avahi-daemon | 224.0.0.251:5353 | — | — | — | whitelisted |
2153 | sora.arm7.elf | 91.235.116.149:1312 | — | Tipzor Media Srl | RO | malicious |
447 | systemd-timesyncd | 168.119.211.223:123 | — | — | — | unknown |
447 | systemd-timesyncd | 94.130.184.193:123 | — | — | — | unknown |
2169 | sora.arm7.elf | 91.235.116.149:1312 | — | Tipzor Media Srl | RO | malicious |
2154 | sora.arm7.elf | 91.235.116.149:1312 | — | Tipzor Media Srl | RO | malicious |
2170 | sora.arm7.elf | 91.235.116.149:1312 | — | Tipzor Media Srl | RO | malicious |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2154 | sora.arm7.elf | Malware Command and Control Activity Detected | BOTNET [ANY.RUN] Possible Mirai.Gen (Linux) |
2154 | sora.arm7.elf | Malware Command and Control Activity Detected | BOTNET [ANY.RUN] Possible Mirai.Gen (Linux) |
2169 | sora.arm7.elf | Malware Command and Control Activity Detected | BOTNET [ANY.RUN] Possible Mirai.Gen (Linux) |
2169 | sora.arm7.elf | Malware Command and Control Activity Detected | BOTNET [ANY.RUN] Possible Mirai.Gen (Linux) |
2153 | sora.arm7.elf | Malware Command and Control Activity Detected | BOTNET [ANY.RUN] Possible Mirai.Gen (Linux) |
2153 | sora.arm7.elf | Malware Command and Control Activity Detected | BOTNET [ANY.RUN] Possible Mirai.Gen (Linux) |
2170 | sora.arm7.elf | Malware Command and Control Activity Detected | BOTNET [ANY.RUN] Possible Mirai.Gen (Linux) |
2170 | sora.arm7.elf | Malware Command and Control Activity Detected | BOTNET [ANY.RUN] Possible Mirai.Gen (Linux) |