SPAWNCHIMERA

SPAWNCHIMERA is a backdoor that supports command and control and can inject malicious components into native processes.[1][2][3] SPAWNCHIMERA It incorporates capabilities from multiple tools within the SPAWN malware family, including SPAWNANT, SPAWNMOLE, and SPAWNSNAIL.[4][2][3] SPAWNCHIMERA was first reported in April 2024.[2] SPAWNCHIMERA has been observed in activity attributed to People's Republic of China (PRC) state-sponsored threat actors, including UNC5221..[4][5][2][6]

ID: S9024
Type: MALWARE
Platforms: Linux, Network Devices
Version: 1.0
Created: 17 April 2026
Last Modified: 23 April 2026

Techniques Used

Domain ID Name Use
Enterprise T1037 Boot or Logon Initialization Scripts

SPAWNCHIMERA has modified the boot process files within /tmp/coreboot_fs/bin/init to establish persistence.[1]

Enterprise T1059 .006 Command and Scripting Interpreter: Python

SPAWNCHIMERA has searched the contents of two Python files scanner.py and scanner_legacy.py by searching for specific lines and replacing them with values that reduce their ability to track mismatches or new files.[1]

Enterprise T1005 Data from Local System

SPAWNCHIMERA has extracted the device’s Linux kernel image (vmlinux).[1][5][6]

Enterprise T1678 Delay Execution

SPAWNCHIMERA has used delayed execution to pause for a defined interval before performing environment discovery, repeatedly checking for specific processes, such as the dslogserver process, prior to continuing execution. [1]

Enterprise T1140 Deobfuscate/Decode Files or Information

SPAWNCHIMERA has decoded a XOR encoded private key.[3]

Enterprise T1685 Disable or Modify Tools

SPAWNCHIMERA has modified the Ivanti Integrity Checker Tool to evade detection.[1][6]

Enterprise T1480 .002 Execution Guardrails: Mutual Exclusion

SPAWNCHIMERA has fixed a buffer overflow vulnerability (CVE-2025-0282) by hooking the strncpy function and limiting the size to 256 to prevent other actors from leveraging the exploit.[3] SPAWNCHIMERA has converted its process name to hexadecimal and verifies an added value which is triggered when the first byte of the source copied to the fixed strncpy function matches 0x04050203.[3]

Enterprise T1574 Hijack Execution Flow

SPAWNCHIMERA can persist across system upgrades by hijacking the execution flow of dspkginstall, a binary used during the system upgrade process.[4][2]

.006 Dynamic Linker Hijacking

SPAWNCHIMERA has been compiled as a Position Independent Executable (PIE) to use a third-party library for injection.[2]

Enterprise T1070 .004 Indicator Removal: File Deletion

SPAWNCHIMERA has deleted generated files and folders from victim devices.[1]

.006 Indicator Removal: Timestomp

SPAWNCHIMERA has updated the timestamp using the touch command.[1]

Enterprise T1559 Inter-Process Communication

SPAWNCHIMERA has leveraged IPC using a UNIX domain socket between the dsmdm process and the web process.[2][3]

Enterprise T1040 Network Sniffing

SPAWNCHIMERA has monitored and filtered network traffic on compromised edge devices, allowing legitimate traffic to pass while redirecting attacker-controlled traffic to infrastructure under adversary control. [4][2]

Enterprise T1571 Non-Standard Port

SPAWNCHIMERA has the ability to bind on a localhost and listen on port 8300.[2][3]

Enterprise T1027 .013 Obfuscated Files or Information: Encrypted/Encoded File

SPAWNCHIMERA has encoded a private key with XOR.[3] SPAWNCHIMERA has also encrypted data to be extracted using AES encryption.[5][6]

Enterprise T1690 Prevent Command History Logging

SPAWNCHIMERA has disabled logging and log forwarding on Ivanti devices targeting the dslogserver process.[1][5][2][6]

Enterprise T1057 Process Discovery

SPAWNCHIMERA has searched for running processes to include web or dsmdm.[1][2]

Enterprise T1055 .002 Process Injection: Portable Executable Injection

SPAWNCHIMERA has executed only in memory and hooked itself into existing processes on the victim device to include the web process.[1][2][3]

Enterprise T1572 Protocol Tunneling

SPAWNCHIMERA has created SSH tunnels to facilitate C2 communications.[1][4][2]

Enterprise T1505 .003 Server Software Component: Web Shell

SPAWNCHIMERA has created web shells that facilitate actions on the victim host.[1]

Enterprise T1518 .001 Software Discovery: Security Software Discovery

SPAWNCHIMERA has checked where SELinux is enabled on the targeted host.[2]

Enterprise T1553 .002 Subvert Trust Controls: Code Signing

SPAWNCHIMERA has generated RSA keys against modified files to sign the manifest file, so they appear legitimate.[1][4]

Enterprise T1082 System Information Discovery

SPAWNCHIMERA has obtained system information such as release, uptime, and current time.[2]

References