Malware Analysis Report

2024-11-15 09:39

Sample ID 220725-d9z7jaddhr
Target 6b9bf7adfe50a9b88917e30915d79e917a5e0e8c7bed1556a40f73b2e92a9be3
SHA256 6b9bf7adfe50a9b88917e30915d79e917a5e0e8c7bed1556a40f73b2e92a9be3
Tags
gafgyt mirai mirai_x86corona
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

6b9bf7adfe50a9b88917e30915d79e917a5e0e8c7bed1556a40f73b2e92a9be3

Threat Level: Known bad

The file 6b9bf7adfe50a9b88917e30915d79e917a5e0e8c7bed1556a40f73b2e92a9be3 was found to be: Known bad.

Malicious Activity Summary

gafgyt mirai mirai_x86corona

Gafgyt family

Mirai family

Mirai_x86corona family

Detect Mirai payload

Detected Gafgyt variant

Detected x86corona Mirai variant

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2022-07-25 03:43

Signatures

Detect Mirai payload

Description Indicator Process Target
N/A N/A N/A N/A

Detected Gafgyt variant

Description Indicator Process Target
N/A N/A N/A N/A

Detected x86corona Mirai variant

Description Indicator Process Target
N/A N/A N/A N/A

Gafgyt family

gafgyt

Mirai family

mirai

Mirai_x86corona family

mirai_x86corona

Analysis: behavioral1

Detonation Overview

Submitted

2022-07-25 03:43

Reported

2022-07-25 03:45

Platform

ubuntu1804-amd64-en-20211208

Max time kernel

19738s

Max time network

141s

Command Line

[/tmp/6b9bf7adfe50a9b88917e30915d79e917a5e0e8c7bed1556a40f73b2e92a9be3]

Signatures

N/A

Processes

/tmp/6b9bf7adfe50a9b88917e30915d79e917a5e0e8c7bed1556a40f73b2e92a9be3

[/tmp/6b9bf7adfe50a9b88917e30915d79e917a5e0e8c7bed1556a40f73b2e92a9be3]

Network

Country Destination Domain Proto
CA 167.99.189.242:1749 tcp
CA 167.99.189.242:1749 tcp
CA 167.99.189.242:1749 tcp

Files

N/A