General
-
Target
Fantazy.i686.elf
-
Size
76KB
-
Sample
241209-w6lh3swrbx
-
MD5
7ab9d8443a34bd4cca723a7c3957d1a6
-
SHA1
a21956ecd293243f2d4799d4a96487cf473c9e87
-
SHA256
d0b59f8fd0dc382ec8ec468eea21999bcfc2e978f658831df04689c3e684a063
-
SHA512
b454b0b8e0adbfca4e23cfd88e60c7e9ad2402d807a6dacf07883e7ecb1e268e033d21ac8c8a17948024ca7d6dbe9f875facc8eedfa9d2de69d37410289eb45d
-
SSDEEP
1536:Kt+qZs87flIJGrw7VODopsKqhG9vkzdit5mAdvigERMSlQg:Kt+grLqJGrw7EDop4hG99xdqgERzlQg
Behavioral task
behavioral1
Sample
Fantazy.i686.elf
Resource
ubuntu2204-amd64-20240522.1-en
Malware Config
Targets
-
-
Target
Fantazy.i686.elf
-
Size
76KB
-
MD5
7ab9d8443a34bd4cca723a7c3957d1a6
-
SHA1
a21956ecd293243f2d4799d4a96487cf473c9e87
-
SHA256
d0b59f8fd0dc382ec8ec468eea21999bcfc2e978f658831df04689c3e684a063
-
SHA512
b454b0b8e0adbfca4e23cfd88e60c7e9ad2402d807a6dacf07883e7ecb1e268e033d21ac8c8a17948024ca7d6dbe9f875facc8eedfa9d2de69d37410289eb45d
-
SSDEEP
1536:Kt+qZs87flIJGrw7VODopsKqhG9vkzdit5mAdvigERMSlQg:Kt+grLqJGrw7EDop4hG99xdqgERzlQg
Score8/10-
Contacts a large (1761) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Writes file to system bin folder
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-