Malware Analysis Report

2024-12-01 00:22

Sample ID 220712-ss4kysfhdp
Target 49db19eeb4ea82cc30e5811ec3ace5879718adf0f311111d5f25bed78c39f577
SHA256 49db19eeb4ea82cc30e5811ec3ace5879718adf0f311111d5f25bed78c39f577
Tags
mirai mirai_x86corona
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

49db19eeb4ea82cc30e5811ec3ace5879718adf0f311111d5f25bed78c39f577

Threat Level: Known bad

The file 49db19eeb4ea82cc30e5811ec3ace5879718adf0f311111d5f25bed78c39f577 was found to be: Known bad.

Malicious Activity Summary

mirai mirai_x86corona

Detected x86corona Mirai variant

Mirai family

Mirai_x86corona family

Detect Mirai payload

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2022-07-12 15:24

Signatures

Detect Mirai payload

Description Indicator Process Target
N/A N/A N/A N/A

Detected x86corona Mirai variant

Description Indicator Process Target
N/A N/A N/A N/A

Mirai family

mirai

Mirai_x86corona family

mirai_x86corona

Analysis: behavioral1

Detonation Overview

Submitted

2022-07-12 15:24

Reported

2022-07-13 00:34

Platform

ubuntu1804-amd64-en-20211208

Max time kernel

0s

Max time network

154s

Command Line

[./49db19eeb4ea82cc30e5811ec3ace5879718adf0f311111d5f25bed78c39f577]

Signatures

N/A

Processes

./49db19eeb4ea82cc30e5811ec3ace5879718adf0f311111d5f25bed78c39f577

[./49db19eeb4ea82cc30e5811ec3ace5879718adf0f311111d5f25bed78c39f577]

Network

Country Destination Domain Proto
NL 109.201.143.179:925 tcp
NL 109.201.143.179:925 tcp
NL 109.201.143.179:925 tcp
NL 109.201.143.179:925 tcp
NL 109.201.143.179:925 tcp

Files

N/A