REPTILE

Description

(Mandiant) To achieve persistent access on the FortiManager device, the threat actor deployed a backdoor with the filename /bin/klogd (MD5: 53a69adac914808eced2bf8155a7512d) that Mandiant refers to as REPTILE, a variant of a publicly available Linux kernel module (LKM) rootkit. With the assistance of TABLEFLIP, the threat actor was able to successfully forward traffic and access the REPTILE backdoor using iptables traffic redirection rules.

Once executed, REPTILE created a packet socket to receive OSI layer 2 packets. When a packet was received, the backdoor would perform the check seen in the pseudocode in Figure 20 to determine if a magic string was present.

Names

Name
REPTILE

Category

Malware

Type

  • Backdoor

Information

Malpedia

Other Information

Uuid

e6153a12-1a8f-4727-8c7d-dfe7ea45cc67

Last Card Change

2024-08-27