Malware Analysis Report

2024-12-01 00:22

Sample ID 220714-cb5tpabed8
Target 48c7072b35f5d0a253917ae17d3808f466bcb3e1d375ce30b0d63d5a43bd2ba6
SHA256 48c7072b35f5d0a253917ae17d3808f466bcb3e1d375ce30b0d63d5a43bd2ba6
Tags
gafgyt mirai mirai_x86corona
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

48c7072b35f5d0a253917ae17d3808f466bcb3e1d375ce30b0d63d5a43bd2ba6

Threat Level: Known bad

The file 48c7072b35f5d0a253917ae17d3808f466bcb3e1d375ce30b0d63d5a43bd2ba6 was found to be: Known bad.

Malicious Activity Summary

gafgyt mirai mirai_x86corona

Mirai family

Mirai_x86corona family

Detect Mirai payload

Detected Gafgyt variant

Detected x86corona Mirai variant

Gafgyt family

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2022-07-14 01:55

Signatures

Detect Mirai payload

Description Indicator Process Target
N/A N/A N/A N/A

Detected Gafgyt variant

Description Indicator Process Target
N/A N/A N/A N/A

Detected x86corona Mirai variant

Description Indicator Process Target
N/A N/A N/A N/A

Gafgyt family

gafgyt

Mirai family

mirai

Mirai_x86corona family

mirai_x86corona

Analysis: behavioral1

Detonation Overview

Submitted

2022-07-14 01:55

Reported

2022-07-14 02:32

Platform

ubuntu1804-amd64-en-20211208

Max time kernel

18784s

Max time network

126s

Command Line

[./48c7072b35f5d0a253917ae17d3808f466bcb3e1d375ce30b0d63d5a43bd2ba6]

Signatures

N/A

Processes

./48c7072b35f5d0a253917ae17d3808f466bcb3e1d375ce30b0d63d5a43bd2ba6

[./48c7072b35f5d0a253917ae17d3808f466bcb3e1d375ce30b0d63d5a43bd2ba6]

Network

Country Destination Domain Proto
US 107.174.14.12:1995 tcp
US 107.174.14.12:1995 tcp
US 107.174.14.12:1995 tcp
US 107.174.14.12:1995 tcp
US 107.174.14.12:1995 tcp

Files

N/A