Executing payload without touching the filesystem (memfd_create syscall)
Tags
attack-pattern: Python - T1059.006
Common Information
Type Value
UUID d560d46e-f6c5-4838-8c92-c7822bd930cb
Fingerprint 2bbac936b8e010f8
Analysis status DONE
Considered CTI value 0
Text language
Published Feb. 20, 2019, 12:16 p.m.
Added to db Jan. 18, 2023, 7:31 p.m.
Last updated Nov. 17, 2024, 6:50 p.m.
Headline Le journal d'un reverser
Title Executing payload without touching the filesystem (memfd_create syscall)
Detected Hints/Tags/Attributes 21/1/15
Attributes
Details Type #Events CTI Value
Details Domain 1
movaxbx.ru
Details Domain 1
x-c3ll.github.io
Details Domain 24
man7.org
Details Domain 1
memfd1.py
Details Domain 1
f1.read
Details File 21
2.html
Details File 1
libc.sys
Details File 1
memfd1.py
Details File 26
os.exe
Details md5 1
443bdd422a4437e319d3b86330990c45
Details IPv4 1441
127.0.0.1
Details Url 1
https://movaxbx.ru/2018/04/02/in-memory-only-elf-execution-without-tmpfs
Details Url 1
https://x-c3ll.github.io/posts/fileless-memfd_create
Details Url 1
http://man7.org/linux/man-pages/man2/memfd_create.2.html
Details Url 1
http://127.0.0.1:8000/payload").content);f2.close();os.execv