Malware Analysis Report

2025-05-28 17:47

Sample ID 220615-r2l7labddk
Target 295a79187770792a578424e77b4a5279bda20d7a1bb5edb4544b8b2fe2c1298c
SHA256 295a79187770792a578424e77b4a5279bda20d7a1bb5edb4544b8b2fe2c1298c
Tags
gafgyt mirai mirai_x86corona
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

295a79187770792a578424e77b4a5279bda20d7a1bb5edb4544b8b2fe2c1298c

Threat Level: Known bad

The file 295a79187770792a578424e77b4a5279bda20d7a1bb5edb4544b8b2fe2c1298c was found to be: Known bad.

Malicious Activity Summary

gafgyt mirai mirai_x86corona

Detected x86corona Mirai Variant

Gafgyt family

Mirai family

Mirai_x86corona family

Detect Mirai Payload

Detected Gafgyt Variant

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2022-06-15 14:41

Signatures

Detect Mirai Payload

Description Indicator Process Target
N/A N/A N/A N/A

Detected Gafgyt Variant

Description Indicator Process Target
N/A N/A N/A N/A

Detected x86corona Mirai Variant

Description Indicator Process Target
N/A N/A N/A N/A

Gafgyt family

gafgyt

Mirai family

mirai

Mirai_x86corona family

mirai_x86corona

Analysis: behavioral1

Detonation Overview

Submitted

2022-06-15 14:41

Reported

2022-06-15 17:48

Platform

ubuntu1804-amd64-en-20211208

Max time kernel

0s

Max time network

153s

Command Line

[./295a79187770792a578424e77b4a5279bda20d7a1bb5edb4544b8b2fe2c1298c]

Signatures

N/A

Processes

./295a79187770792a578424e77b4a5279bda20d7a1bb5edb4544b8b2fe2c1298c

[./295a79187770792a578424e77b4a5279bda20d7a1bb5edb4544b8b2fe2c1298c]

Network

Country Destination Domain Proto
IT 80.211.167.8:23 tcp
IT 80.211.167.8:23 tcp
IT 80.211.167.8:23 tcp
IT 80.211.167.8:23 tcp
IT 80.211.167.8:23 tcp

Files

N/A