Analysis Overview
SHA256
34c0cb78cacef4498b5d7a572a4e25aafeb4a6b49fc9f24cb6b3ac9e6aaaa781
Threat Level: No (potentially) malicious behavior was detected
The file 4d0f5c6ffc911477212d4ace7b601dae was found to be: No (potentially) malicious behavior was detected.
Malicious Activity Summary
Detect Mirai Payload
Identified Kaiten Bot
Kaiten family
Mirai family
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2022-01-22 13:09
Signatures
Detect Mirai Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Identified Kaiten Bot
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Kaiten family
Mirai family
Analysis: behavioral1
Detonation Overview
Submitted
2022-01-22 13:09
Reported
2022-01-22 13:09
Platform
ubuntu1804-amd64-en-20211208
Max time kernel
0s
Command Line
Signatures
Processes
./4d0f5c6ffc911477212d4ace7b601dae
[./4d0f5c6ffc911477212d4ace7b601dae]
Network
Files
Analysis: behavioral2
Detonation Overview
Submitted
2022-01-22 13:09
Reported
2022-01-22 13:09
Platform
debian9-armhf-en-20211208
Max time kernel
0s
Command Line
Signatures
Processes
./4d0f5c6ffc911477212d4ace7b601dae
[./4d0f5c6ffc911477212d4ace7b601dae]
Network
Files
Analysis: behavioral3
Detonation Overview
Submitted
2022-01-22 13:09
Reported
2022-01-22 13:09
Platform
debian9-mipsbe-en-20211208
Max time kernel
0s
Command Line
Signatures
Processes
./4d0f5c6ffc911477212d4ace7b601dae
[./4d0f5c6ffc911477212d4ace7b601dae]
Network
Files
Analysis: behavioral4
Detonation Overview
Submitted
2022-01-22 13:09
Reported
2022-01-22 13:09
Platform
debian9-mipsel-en-20211208
Max time kernel
0s
Command Line
Signatures
Processes
./4d0f5c6ffc911477212d4ace7b601dae
[./4d0f5c6ffc911477212d4ace7b601dae]