Analysis Overview
SHA256
9b41bdd25e6d022edc90e42440c4d0030d0b3d4f6c3f340a19a43ce195089189
Threat Level: No (potentially) malicious behavior was detected
The file ef9f72ac5e367e178fd991c2aa20630c was found to be: No (potentially) malicious behavior was detected.
Malicious Activity Summary
Mirai family
Mirai_x86corona family
Detect Mirai Payload
Detected x86corona Mirai Variant
Identified Kaiten Bot
Kaiten family
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2022-01-13 15:02
Signatures
Detect Mirai Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Detected x86corona Mirai Variant
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Identified Kaiten Bot
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Kaiten family
Mirai family
Mirai_x86corona family
Analysis: behavioral1
Detonation Overview
Submitted
2022-01-13 15:02
Reported
2022-01-13 15:04
Platform
win7-en-20211208
Max time kernel
120s
Max time network
122s
Command Line
Signatures
Processes
C:\Windows\system32\cmd.exe
cmd /c C:\Users\Admin\AppData\Local\Temp\ef9f72ac5e367e178fd991c2aa20630c
Network
Files
Analysis: behavioral2
Detonation Overview
Submitted
2022-01-13 15:02
Reported
2022-01-13 15:04
Platform
win10-en-20211208
Max time kernel
111s
Max time network
129s
Command Line
Signatures
Processes
C:\Windows\system32\cmd.exe
cmd /c C:\Users\Admin\AppData\Local\Temp\ef9f72ac5e367e178fd991c2aa20630c