Analysis
-
max time kernel
11s -
max time network
27s -
platform
ubuntu-22.04_amd64 -
resource
ubuntu2204-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu2204-amd64-20240611-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system -
submitted
01-02-2025 09:37
Behavioral task
behavioral1
Sample
Fantazy.x86_64.elf
Resource
ubuntu2204-amd64-20240611-en
General
-
Target
Fantazy.x86_64.elf
-
Size
72KB
-
MD5
9a0249531baca3cf92ebe1fa27522d92
-
SHA1
89eba585573b74ee422bece2ae70fc540345cad7
-
SHA256
54ab484a8249dcc8c36cd28c22546b518836e12d7bae3fbed3b3642453f73d5f
-
SHA512
4df28512f00112adfa9ae1839cb9977f8e315022c08378c0d0a091c78a7f2f29911e669558ef3637ceaaed74c7ebb9bf3c9a454a2805a3b0899a22b9cf5d3cef
-
SSDEEP
1536:cBuGUrgqzxzeRuTFtrPNJczvMSpuxf2UOKvMzg6wnAVJwA:aujzFouTDrNJczSFdOKEzggVJwA
Malware Config
Signatures
-
Contacts a large (1921) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog Fantazy.x86_64.elf File opened for modification /dev/misc/watchdog Fantazy.x86_64.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog Fantazy.x86_64.elf File opened for modification /bin/watchdog Fantazy.x86_64.elf -
Reads process memory 1 TTPs 7 IoCs
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
description ioc Process File opened for reading /proc/427/maps Fantazy.x86_64.elf File opened for reading /proc/406/maps Fantazy.x86_64.elf File opened for reading /proc/409/maps Fantazy.x86_64.elf File opened for reading /proc/412/maps Fantazy.x86_64.elf File opened for reading /proc/414/maps Fantazy.x86_64.elf File opened for reading /proc/416/maps Fantazy.x86_64.elf File opened for reading /proc/418/maps Fantazy.x86_64.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself a 1570 Fantazy.x86_64.elf