Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
5544x64.elf

Overview

General Information

Sample name:5544x64.elf
Analysis ID:1576279
MD5:59683c48cdc2f63363942ca921f17af2
SHA1:df29da5f5e3cbb7a8b34cd036cdedde8d6384b64
SHA256:561b89228b562c0a0b53b5848a179fac10ae0226706db82e8dd24226da199d94
Tags:elfmalwaremeterpreteruser-Joker
Infos:

Detection

ConnectBack
Score:68
Range:0 - 100
Whitelisted:false

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected ConnectBack
Machine Learning detection for sample
Detected TCP or UDP traffic on non-standard ports
Sample contains only a LOAD segment without any section mappings
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1576279
Start date and time:2024-12-16 17:59:08 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 22s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:5544x64.elf
Detection:MAL
Classification:mal68.troj.linELF@0/0@2/0
  • VT rate limit hit for: 5544x64.elf
Command:/tmp/5544x64.elf
PID:5486
Exit Code:139
Exit Code Info:SIGSEGV (11) Segmentation fault invalid memory reference
Killed:False
Standard Output:

Standard Error:
  • system is lnxubuntu20
  • 5544x64.elf (PID: 5486, Parent: 5409, MD5: 59683c48cdc2f63363942ca921f17af2) Arguments: /tmp/5544x64.elf
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
ConnectBackConnectBack malware is a type of malicious software designed to establish unauthorized connections from an infected system to a remote server. Once a victim's device is compromised, ConnectBack creates a covert channel for communication, allowing the attacker to remotely control and gather sensitive information from the compromised system.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.connectback
SourceRuleDescriptionAuthorStrings
5544x64.elfJoeSecurity_ConnectBackYara detected ConnectBackJoe Security
    SourceRuleDescriptionAuthorStrings
    5486.1.0000000000400000.0000000000401000.rwx.sdmpJoeSecurity_ConnectBackYara detected ConnectBackJoe Security
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 5544x64.elfMalware Configuration Extractor: ConnectBack {"C2": "45.43.36.223:5544"}
      Source: 5544x64.elfReversingLabs: Detection: 63%
      Source: 5544x64.elfJoe Sandbox ML: detected
      Source: global trafficTCP traffic: 192.168.2.14:34390 -> 45.43.36.223:5544
      Source: global trafficTCP traffic: 192.168.2.14:46540 -> 185.125.190.26:443
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
      Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
      Source: unknownNetwork traffic detected: HTTP traffic on port 46540 -> 443
      Source: LOAD without section mappingsProgram segment: 0x400000
      Source: classification engineClassification label: mal68.troj.linELF@0/0@2/0

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 5544x64.elf, type: SAMPLE
      Source: Yara matchFile source: 5486.1.0000000000400000.0000000000401000.rwx.sdmp, type: MEMORY

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 5544x64.elf, type: SAMPLE
      Source: Yara matchFile source: 5486.1.0000000000400000.0000000000401000.rwx.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
      Non-Standard Port
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
      Application Layer Protocol
      Traffic DuplicationData Destruction
      {"C2": "45.43.36.223:5544"}
      SourceDetectionScannerLabelLink
      5544x64.elf63%ReversingLabsLinux.Backdoor.ConnectBack
      5544x64.elf100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      NameIPActiveMaliciousAntivirus DetectionReputation
      daisy.ubuntu.com
      162.213.35.25
      truefalse
        high
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        185.125.190.26
        unknownUnited Kingdom
        41231CANONICAL-ASGBfalse
        45.43.36.223
        unknownUnited States
        135377UHGL-AS-APUCloudHKHoldingsGroupLimitedHKtrue
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        185.125.190.26zmap.x86.elfGet hashmaliciousOkiruBrowse
          zmap.arm6.elfGet hashmaliciousMirai, OkiruBrowse
            main_arm.elfGet hashmaliciousMiraiBrowse
              main_sh4.elfGet hashmaliciousMiraiBrowse
                armv7l.elfGet hashmaliciousMiraiBrowse
                  armv6l.elfGet hashmaliciousMiraiBrowse
                    la.bot.sparc.elfGet hashmaliciousMiraiBrowse
                      main_x86_64.elfGet hashmaliciousMiraiBrowse
                        arc.elfGet hashmaliciousMiraiBrowse
                          sh4.elfGet hashmaliciousMiraiBrowse
                            45.43.36.223shell64.elfGet hashmaliciousConnectBackBrowse
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              daisy.ubuntu.comsh4.elfGet hashmaliciousMiraiBrowse
                              • 162.213.35.24
                              arm7.elfGet hashmaliciousMiraiBrowse
                              • 162.213.35.24
                              debug.dbg.elfGet hashmaliciousMirai, OkiruBrowse
                              • 162.213.35.25
                              zmap.arm6.elfGet hashmaliciousMirai, OkiruBrowse
                              • 162.213.35.25
                              mipsel.elfGet hashmaliciousGafgyt, MiraiBrowse
                              • 162.213.35.25
                              x86_64.elfGet hashmaliciousGafgyt, MiraiBrowse
                              • 162.213.35.25
                              powerpc.elfGet hashmaliciousGafgyt, MiraiBrowse
                              • 162.213.35.25
                              armv7l.elfGet hashmaliciousGafgyt, MiraiBrowse
                              • 162.213.35.25
                              8lSWx5kumf.elfGet hashmaliciousUnknownBrowse
                              • 162.213.35.25
                              UrVQpxwfbD.elfGet hashmaliciousUnknownBrowse
                              • 162.213.35.24
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              CANONICAL-ASGBppc.elfGet hashmaliciousMiraiBrowse
                              • 185.125.190.26
                              zmap.mpsl.elfGet hashmaliciousMirai, OkiruBrowse
                              • 91.189.91.42
                              mips.elfGet hashmaliciousMiraiBrowse
                              • 91.189.91.42
                              spc.elfGet hashmaliciousMiraiBrowse
                              • 91.189.91.42
                              zmap.ppc.elfGet hashmaliciousMirai, OkiruBrowse
                              • 91.189.91.42
                              zmap.mips.elfGet hashmaliciousMirai, OkiruBrowse
                              • 91.189.91.42
                              arm6.elfGet hashmaliciousMiraiBrowse
                              • 91.189.91.42
                              arm.elfGet hashmaliciousMiraiBrowse
                              • 91.189.91.42
                              m68k.elfGet hashmaliciousMiraiBrowse
                              • 91.189.91.42
                              x86.elfGet hashmaliciousMiraiBrowse
                              • 91.189.91.42
                              UHGL-AS-APUCloudHKHoldingsGroupLimitedHKrebirth.mpsl.elfGet hashmaliciousMirai, OkiruBrowse
                              • 128.1.49.123
                              ORDER-401.exeGet hashmaliciousFormBookBrowse
                              • 107.155.56.30
                              MAERSK LINE SHIPPING DOC_4253.exeGet hashmaliciousFormBookBrowse
                              • 107.155.56.30
                              New Purchase Order.exeGet hashmaliciousFormBookBrowse
                              • 107.155.56.30
                              Docs.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                              • 107.155.56.30
                              nabppc.elfGet hashmaliciousUnknownBrowse
                              • 107.155.48.54
                              shell64.elfGet hashmaliciousConnectBackBrowse
                              • 45.43.36.223
                              XFO-E2024-013 SMP-10.3-F01-2210 Host spare parts.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                              • 107.155.56.30
                              Swift copy.exeGet hashmaliciousFormBookBrowse
                              • 107.155.56.30
                              SecuriteInfo.com.Trojan.GenericKD.72343208.3006.1077.exeGet hashmaliciousUnknownBrowse
                              • 152.32.197.201
                              No context
                              No context
                              No created / dropped files found
                              File type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, no section header
                              Entropy (8bit):4.276692563343198
                              TrID:
                              • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                              • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                              File name:5544x64.elf
                              File size:250 bytes
                              MD5:59683c48cdc2f63363942ca921f17af2
                              SHA1:df29da5f5e3cbb7a8b34cd036cdedde8d6384b64
                              SHA256:561b89228b562c0a0b53b5848a179fac10ae0226706db82e8dd24226da199d94
                              SHA512:a830a894f1433ebff15721b9c974f744defdec688bf41634ae527e8a1f39932573c8f84780a954fd2d7154f3c45ef799ec457b0d21d91c4861ddd42f50fe1246
                              SSDEEP:6:BnX//In8/r1uBxHocmTxteQ3RQdygg5XJYD:BvwncrAH3m9tn532D
                              TLSH:8CD080330B0A40DADBE4033FA57859DCD77B8976574962311D90DC010C096046F52C75
                              File Content Preview:.ELF..............>.....x.@.....@...................@.8...........................@.......@.............|...............1.j.X...H..M1.j"AZj.Z..H..xQj.AYPj)X.j._j.^..H..x;H.H.....-+$.QH..j.Zj*X..YH..y%I..t.Wj#Xj.j.H..H1...YY_H..y.j<Xj._..^j~Z..H..x...

                              ELF header

                              Class:ELF64
                              Data:2's complement, little endian
                              Version:1 (current)
                              Machine:Advanced Micro Devices X86-64
                              Version Number:0x1
                              Type:EXEC (Executable file)
                              OS/ABI:UNIX - System V
                              ABI Version:0
                              Entry Point Address:0x400078
                              Flags:0x0
                              ELF Header Size:64
                              Program Header Offset:64
                              Program Header Size:56
                              Number of Program Headers:1
                              Section Header Offset:0
                              Section Header Size:0
                              Number of Section Headers:0
                              Header String Table Index:0
                              TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                              LOAD0x00x4000000x4000000xfa0x17c4.27670x7RWE0x1000
                              TimestampSource PortDest PortSource IPDest IP
                              Dec 16, 2024 17:59:49.397922993 CET343905544192.168.2.1445.43.36.223
                              Dec 16, 2024 17:59:49.517844915 CET55443439045.43.36.223192.168.2.14
                              Dec 16, 2024 17:59:49.518136024 CET343905544192.168.2.1445.43.36.223
                              Dec 16, 2024 17:59:52.097798109 CET55443439045.43.36.223192.168.2.14
                              Dec 16, 2024 17:59:52.100560904 CET343905544192.168.2.1445.43.36.223
                              Dec 16, 2024 17:59:52.256668091 CET343905544192.168.2.1445.43.36.223
                              Dec 16, 2024 17:59:52.376533985 CET55443439045.43.36.223192.168.2.14
                              Dec 16, 2024 17:59:58.900115013 CET46540443192.168.2.14185.125.190.26
                              Dec 16, 2024 18:00:29.618916988 CET46540443192.168.2.14185.125.190.26
                              TimestampSource PortDest PortSource IPDest IP
                              Dec 16, 2024 17:59:52.865037918 CET4926953192.168.2.141.1.1.1
                              Dec 16, 2024 17:59:52.865107059 CET4119353192.168.2.141.1.1.1
                              Dec 16, 2024 17:59:53.087002993 CET53492691.1.1.1192.168.2.14
                              Dec 16, 2024 17:59:53.095988989 CET53411931.1.1.1192.168.2.14
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Dec 16, 2024 17:59:52.865037918 CET192.168.2.141.1.1.10xba81Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                              Dec 16, 2024 17:59:52.865107059 CET192.168.2.141.1.1.10xdf9fStandard query (0)daisy.ubuntu.com28IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Dec 16, 2024 17:59:53.087002993 CET1.1.1.1192.168.2.140xba81No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
                              Dec 16, 2024 17:59:53.087002993 CET1.1.1.1192.168.2.140xba81No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false

                              System Behavior

                              Start time (UTC):16:59:48
                              Start date (UTC):16/12/2024
                              Path:/tmp/5544x64.elf
                              Arguments:/tmp/5544x64.elf
                              File size:250 bytes
                              MD5 hash:59683c48cdc2f63363942ca921f17af2