Malware Analysis Report

2025-04-03 09:55

Sample ID 220630-w3ydgahfh5
Target 4ea272781b0d1a851383144a4b9bcaf1942aa23b8924de8bc8d2a6960550a50f
SHA256 4ea272781b0d1a851383144a4b9bcaf1942aa23b8924de8bc8d2a6960550a50f
Tags
mirai mirai_x86corona
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

4ea272781b0d1a851383144a4b9bcaf1942aa23b8924de8bc8d2a6960550a50f

Threat Level: Known bad

The file 4ea272781b0d1a851383144a4b9bcaf1942aa23b8924de8bc8d2a6960550a50f was found to be: Known bad.

Malicious Activity Summary

mirai mirai_x86corona

Detect Mirai Payload

Detected x86corona Mirai Variant

Mirai family

Mirai_x86corona family

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2022-06-30 18:27

Signatures

Detect Mirai Payload

Description Indicator Process Target
N/A N/A N/A N/A

Detected x86corona Mirai Variant

Description Indicator Process Target
N/A N/A N/A N/A

Mirai family

mirai

Mirai_x86corona family

mirai_x86corona

Analysis: behavioral1

Detonation Overview

Submitted

2022-06-30 18:27

Reported

2022-06-30 18:57

Platform

ubuntu1804-amd64-en-20211208

Max time kernel

0s

Max time network

153s

Command Line

[./4ea272781b0d1a851383144a4b9bcaf1942aa23b8924de8bc8d2a6960550a50f]

Signatures

N/A

Processes

./4ea272781b0d1a851383144a4b9bcaf1942aa23b8924de8bc8d2a6960550a50f

[./4ea272781b0d1a851383144a4b9bcaf1942aa23b8924de8bc8d2a6960550a50f]

Network

Country Destination Domain Proto
NL 192.210.175.228:666 tcp
NL 192.210.175.228:666 tcp
NL 192.210.175.228:666 tcp
NL 192.210.175.228:666 tcp
NL 192.210.175.228:666 tcp

Files

N/A