General

  • Target

    Fantazy.i686.elf

  • Size

    76KB

  • Sample

    241209-w6lh3swrbx

  • MD5

    7ab9d8443a34bd4cca723a7c3957d1a6

  • SHA1

    a21956ecd293243f2d4799d4a96487cf473c9e87

  • SHA256

    d0b59f8fd0dc382ec8ec468eea21999bcfc2e978f658831df04689c3e684a063

  • SHA512

    b454b0b8e0adbfca4e23cfd88e60c7e9ad2402d807a6dacf07883e7ecb1e268e033d21ac8c8a17948024ca7d6dbe9f875facc8eedfa9d2de69d37410289eb45d

  • SSDEEP

    1536:Kt+qZs87flIJGrw7VODopsKqhG9vkzdit5mAdvigERMSlQg:Kt+grLqJGrw7EDop4hG99xdqgERzlQg

Malware Config

Targets

    • Target

      Fantazy.i686.elf

    • Size

      76KB

    • MD5

      7ab9d8443a34bd4cca723a7c3957d1a6

    • SHA1

      a21956ecd293243f2d4799d4a96487cf473c9e87

    • SHA256

      d0b59f8fd0dc382ec8ec468eea21999bcfc2e978f658831df04689c3e684a063

    • SHA512

      b454b0b8e0adbfca4e23cfd88e60c7e9ad2402d807a6dacf07883e7ecb1e268e033d21ac8c8a17948024ca7d6dbe9f875facc8eedfa9d2de69d37410289eb45d

    • SSDEEP

      1536:Kt+qZs87flIJGrw7VODopsKqhG9vkzdit5mAdvigERMSlQg:Kt+grLqJGrw7EDop4hG99xdqgERzlQg

    • Contacts a large (1761) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Writes file to system bin folder

    • Reads process memory

      Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

MITRE ATT&CK Enterprise v15

Tasks