Malware Analysis Report

2024-11-15 09:30

Sample ID 220724-3vve6sebbn
Target 871c836d030252c01a853996c8b1be1aa122b55f6dd5280dc469c15be9d97289
SHA256 871c836d030252c01a853996c8b1be1aa122b55f6dd5280dc469c15be9d97289
Tags
gafgyt mirai mirai_x86corona
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

871c836d030252c01a853996c8b1be1aa122b55f6dd5280dc469c15be9d97289

Threat Level: Known bad

The file 871c836d030252c01a853996c8b1be1aa122b55f6dd5280dc469c15be9d97289 was found to be: Known bad.

Malicious Activity Summary

gafgyt mirai mirai_x86corona

Detect Mirai payload

Detected Gafgyt variant

Detected x86corona Mirai variant

Gafgyt family

Mirai family

Mirai_x86corona family

Writes file to tmp directory

Reads runtime system information

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2022-07-24 23:50

Signatures

Detect Mirai payload

Description Indicator Process Target
N/A N/A N/A N/A

Detected Gafgyt variant

Description Indicator Process Target
N/A N/A N/A N/A

Detected x86corona Mirai variant

Description Indicator Process Target
N/A N/A N/A N/A

Gafgyt family

gafgyt

Mirai family

mirai

Mirai_x86corona family

mirai_x86corona

Analysis: behavioral1

Detonation Overview

Submitted

2022-07-24 23:50

Reported

2022-07-25 00:13

Platform

ubuntu1804-amd64-en-20211208

Max time kernel

0s

Max time network

141s

Command Line

[/tmp/871c836d030252c01a853996c8b1be1aa122b55f6dd5280dc469c15be9d97289]

Signatures

Reads runtime system information

Description Indicator Process Target
/proc/filesystems /proc/filesystems /bin/mkdir N/A

Writes file to tmp directory

Description Indicator Process Target
/tmp/.clt /tmp/.clt /bin/rm N/A

Processes

/tmp/871c836d030252c01a853996c8b1be1aa122b55f6dd5280dc469c15be9d97289

[/tmp/871c836d030252c01a853996c8b1be1aa122b55f6dd5280dc469c15be9d97289]

/bin/sh

[sh -c rm -rf /tmp/.clt;mkdir /tmp/.clt]

/bin/rm

[rm -rf /tmp/.clt]

/bin/mkdir

[mkdir /tmp/.clt]

Network

Country Destination Domain Proto
FR 91.121.226.126:252 tcp
FR 91.121.226.126:252 tcp
FR 91.121.226.126:252 tcp

Files

N/A