Analysis

  • max time kernel
    10s
  • max time network
    43s
  • platform
    ubuntu-22.04_amd64
  • resource
    ubuntu2204-amd64-20240611-en
  • resource tags

    arch:amd64arch:i386image:ubuntu2204-amd64-20240611-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system
  • submitted
    09-12-2024 18:39

General

  • Target

    Fantazy.i686.elf

  • Size

    76KB

  • MD5

    7ab9d8443a34bd4cca723a7c3957d1a6

  • SHA1

    a21956ecd293243f2d4799d4a96487cf473c9e87

  • SHA256

    d0b59f8fd0dc382ec8ec468eea21999bcfc2e978f658831df04689c3e684a063

  • SHA512

    b454b0b8e0adbfca4e23cfd88e60c7e9ad2402d807a6dacf07883e7ecb1e268e033d21ac8c8a17948024ca7d6dbe9f875facc8eedfa9d2de69d37410289eb45d

  • SSDEEP

    1536:Kt+qZs87flIJGrw7VODopsKqhG9vkzdit5mAdvigERMSlQg:Kt+grLqJGrw7EDop4hG99xdqgERzlQg

Malware Config

Signatures

  • Contacts a large (1918) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Writes file to system bin folder 2 IoCs
  • Reads process memory 1 TTPs 6 IoCs

    Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

  • Changes its process name 1 IoCs

Processes

  • /tmp/Fantazy.i686.elf
    /tmp/Fantazy.i686.elf
    1⤵
    • Modifies Watchdog functionality
    • Writes file to system bin folder
    • Reads process memory
    • Changes its process name
    PID:1587

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads