Malware Analysis Report

2024-11-15 09:33

Sample ID 220725-crc4lsaghk
Target a9d571d626081845a0b15e9e17dcc99b8a48e1fea54486c6fa6554f08055b8da
SHA256 a9d571d626081845a0b15e9e17dcc99b8a48e1fea54486c6fa6554f08055b8da
Tags
mirai mirai_x86corona
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

a9d571d626081845a0b15e9e17dcc99b8a48e1fea54486c6fa6554f08055b8da

Threat Level: Known bad

The file a9d571d626081845a0b15e9e17dcc99b8a48e1fea54486c6fa6554f08055b8da was found to be: Known bad.

Malicious Activity Summary

mirai mirai_x86corona

Detect Mirai payload

Detected x86corona Mirai variant

Mirai family

Mirai_x86corona family

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2022-07-25 02:18

Signatures

Detect Mirai payload

Description Indicator Process Target
N/A N/A N/A N/A

Detected x86corona Mirai variant

Description Indicator Process Target
N/A N/A N/A N/A

Mirai family

mirai

Mirai_x86corona family

mirai_x86corona

Analysis: behavioral1

Detonation Overview

Submitted

2022-07-25 02:18

Reported

2022-07-25 02:20

Platform

ubuntu1804-amd64-en-20211208

Max time kernel

0s

Max time network

152s

Command Line

[/tmp/a9d571d626081845a0b15e9e17dcc99b8a48e1fea54486c6fa6554f08055b8da]

Signatures

N/A

Processes

/tmp/a9d571d626081845a0b15e9e17dcc99b8a48e1fea54486c6fa6554f08055b8da

[/tmp/a9d571d626081845a0b15e9e17dcc99b8a48e1fea54486c6fa6554f08055b8da]

Network

Country Destination Domain Proto
FR 164.132.92.139:2525 tcp
FR 164.132.92.139:2525 tcp
FR 164.132.92.139:2525 tcp
FR 164.132.92.139:2525 tcp
FR 164.132.92.139:2525 tcp

Files

N/A