Regions Targeted: Middle East
Related Families: None
Key Takeaways
What is Landfall?
The infection begins with processing the malformed DNG file, which triggers the vulnerability to extract and execute two primary components: an ARM64 ELF shared object loader and an XZ-compressed SELinux policy manipulator. The loader, internally referenced as "Bridge Head," handles initial beaconing to command-and-control (C2) servers via HTTPS on non-standard ports, transmitting device fingerprints including IMEI, IMSI, OS version, and installed applications.
Landfall's modular design supports downloading additional payloads for expanded functionality. Debug strings in b.so reveal potential commands for call recording, SMS collection, arbitrary file access, process injection, and persistence mechanisms. It manipulates SELinux policies to elevate privileges and monitors directories like WhatsApp Media for further instructions. Evasion techniques include detecting debuggers, Frida, and Xposed. Certificate pinning secures C2 communications.
IOCs
PolySwarm has multiple samples of Landfall.
9297888746158e38d320b05b27b0032b2cc29231be8990d87bc46f1e06456f93
c0f30c2a2d6f95b57128e78dc0b7180e69315057e62809de1926b75f86516b2e
b975b499baa3119ac5c2b3379306d4e50b9610e9bba3e56de7dfd3927a96032d
29882a3c426273a7302e852aa77662e168b6d44dcebfca53757e29a9cdf02483
b45817ffb0355badcc89f2d7d48eecf00ebdf2b966ac986514f9d971f6c57d18
You can use the following CLI command to search for all Landfall samples in our portal:
$ polyswarm link list -f Landfall
Don’t have a PolySwarm account? Go here to sign up for a free Community plan or subscribe.
Contact us at hivemind@polyswarm.io | Check out our blog | Subscribe to our reports.