Malware Analysis Report

2025-06-15 22:01

Sample ID 220415-cbd1zagcgk
Target 691d4520f643ad9cdfdd55470ee5b6d4c72f833e3a27e5f1a798897e23c9f519
SHA256 691d4520f643ad9cdfdd55470ee5b6d4c72f833e3a27e5f1a798897e23c9f519
Tags
gafgyt mirai mirai_x86corona
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

691d4520f643ad9cdfdd55470ee5b6d4c72f833e3a27e5f1a798897e23c9f519

Threat Level: Known bad

The file 691d4520f643ad9cdfdd55470ee5b6d4c72f833e3a27e5f1a798897e23c9f519 was found to be: Known bad.

Malicious Activity Summary

gafgyt mirai mirai_x86corona

Mirai_x86corona family

Detect Mirai Payload

Detected Gafgyt Variant

Detected x86corona Mirai Variant

Gafgyt family

Mirai family

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2022-04-15 01:53

Signatures

Detect Mirai Payload

Description Indicator Process Target
N/A N/A N/A N/A

Detected Gafgyt Variant

Description Indicator Process Target
N/A N/A N/A N/A

Detected x86corona Mirai Variant

Description Indicator Process Target
N/A N/A N/A N/A

Gafgyt family

gafgyt

Mirai family

mirai

Mirai_x86corona family

mirai_x86corona

Analysis: behavioral1

Detonation Overview

Submitted

2022-04-15 01:53

Reported

2022-04-15 02:05

Platform

ubuntu1804-amd64-en-20211208

Max time kernel

11006s

Max time network

147s

Command Line

[./691d4520f643ad9cdfdd55470ee5b6d4c72f833e3a27e5f1a798897e23c9f519]

Signatures

N/A

Processes

./691d4520f643ad9cdfdd55470ee5b6d4c72f833e3a27e5f1a798897e23c9f519

[./691d4520f643ad9cdfdd55470ee5b6d4c72f833e3a27e5f1a798897e23c9f519]

Network

Country Destination Domain Proto
US 51.81.51.212:23 tcp
US 104.168.137.7:666 tcp
US 104.168.137.7:666 tcp
US 104.168.137.7:666 tcp
US 104.168.137.7:666 tcp
US 104.168.137.7:666 tcp
US 104.168.137.7:666 tcp
US 104.168.137.7:666 tcp
US 104.168.137.7:666 tcp

Files

N/A