Malware Analysis Report

2025-05-28 17:53

Sample ID 220615-gz57kschg8
Target 2a4a12a9e5dcea44ae2b7cdd34e8818aec22d3dd924e9d9e6a4044646307b8f3
SHA256 2a4a12a9e5dcea44ae2b7cdd34e8818aec22d3dd924e9d9e6a4044646307b8f3
Tags
mirai mirai_x86corona
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

2a4a12a9e5dcea44ae2b7cdd34e8818aec22d3dd924e9d9e6a4044646307b8f3

Threat Level: Known bad

The file 2a4a12a9e5dcea44ae2b7cdd34e8818aec22d3dd924e9d9e6a4044646307b8f3 was found to be: Known bad.

Malicious Activity Summary

mirai mirai_x86corona

Detect Mirai Payload

Detected x86corona Mirai Variant

Mirai family

Mirai is a prevalent Linux malware infecting exposed network devices

Mirai_x86corona family

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2022-06-15 06:15

Signatures

Detect Mirai Payload

Description Indicator Process Target
N/A N/A N/A N/A

Detected x86corona Mirai Variant

Description Indicator Process Target
N/A N/A N/A N/A

Mirai family

mirai

Mirai is a prevalent Linux malware infecting exposed network devices

Description Indicator Process Target
N/A N/A N/A N/A

Mirai_x86corona family

mirai_x86corona

Analysis: behavioral1

Detonation Overview

Submitted

2022-06-15 06:15

Reported

2022-06-15 13:53

Platform

ubuntu1804-amd64-en-20211208

Max time kernel

0s

Max time network

103s

Command Line

[./2a4a12a9e5dcea44ae2b7cdd34e8818aec22d3dd924e9d9e6a4044646307b8f3]

Signatures

N/A

Processes

./2a4a12a9e5dcea44ae2b7cdd34e8818aec22d3dd924e9d9e6a4044646307b8f3

[./2a4a12a9e5dcea44ae2b7cdd34e8818aec22d3dd924e9d9e6a4044646307b8f3]

Network

Files

N/A