Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
cats.elf

Overview

General Information

Sample name:cats.elf
Analysis ID:1583676
MD5:3f69f32ced51bb702e37f99b168b7501
SHA1:6aa20482e18aef7c793ef7b62a9382f0a5faf613
SHA256:bd4f5d6023050e6c451469ca0e1e777d55d1ef846c8b00cece7c1e29eb422698
Tags:CobaltStrikeelfmalwareuser-Joker
Infos:

Detection

ConnectBack
Score:68
Range:0 - 100
Whitelisted:false

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected ConnectBack
Machine Learning detection for sample
Detected TCP or UDP traffic on non-standard ports
Sample contains only a LOAD segment without any section mappings

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1583676
Start date and time:2025-01-03 10:09:08 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 16s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:cats.elf
Detection:MAL
Classification:mal68.troj.linELF@0/0@2/0
Command:/tmp/cats.elf
PID:5443
Exit Code:139
Exit Code Info:SIGSEGV (11) Segmentation fault invalid memory reference
Killed:False
Standard Output:

Standard Error:
  • system is lnxubuntu20
  • cats.elf (PID: 5443, Parent: 5367, MD5: 3f69f32ced51bb702e37f99b168b7501) Arguments: /tmp/cats.elf
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
ConnectBackConnectBack malware is a type of malicious software designed to establish unauthorized connections from an infected system to a remote server. Once a victim's device is compromised, ConnectBack creates a covert channel for communication, allowing the attacker to remotely control and gather sensitive information from the compromised system.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.connectback
SourceRuleDescriptionAuthorStrings
cats.elfJoeSecurity_ConnectBackYara detected ConnectBackJoe Security
    SourceRuleDescriptionAuthorStrings
    5443.1.0000000000400000.0000000000401000.rwx.sdmpJoeSecurity_ConnectBackYara detected ConnectBackJoe Security
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: cats.elfMalware Configuration Extractor: ConnectBack {"C2": "107.173.129.144:4455"}
      Source: cats.elfVirustotal: Detection: 42%Perma Link
      Source: cats.elfReversingLabs: Detection: 47%
      Source: cats.elfJoe Sandbox ML: detected
      Source: global trafficTCP traffic: 192.168.2.13:42130 -> 107.173.129.144:4455
      Source: unknownTCP traffic detected without corresponding DNS query: 107.173.129.144
      Source: unknownTCP traffic detected without corresponding DNS query: 107.173.129.144
      Source: unknownTCP traffic detected without corresponding DNS query: 107.173.129.144
      Source: unknownTCP traffic detected without corresponding DNS query: 107.173.129.144
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
      Source: LOAD without section mappingsProgram segment: 0x400000
      Source: classification engineClassification label: mal68.troj.linELF@0/0@2/0

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: cats.elf, type: SAMPLE
      Source: Yara matchFile source: 5443.1.0000000000400000.0000000000401000.rwx.sdmp, type: MEMORY

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: cats.elf, type: SAMPLE
      Source: Yara matchFile source: 5443.1.0000000000400000.0000000000401000.rwx.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
      Non-Standard Port
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      {"C2": "107.173.129.144:4455"}
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Number of created Files
      • Is malicious
      • Internet
      SourceDetectionScannerLabelLink
      cats.elf42%VirustotalBrowse
      cats.elf47%ReversingLabsLinux.Backdoor.ConnectBack
      cats.elf100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      NameIPActiveMaliciousAntivirus DetectionReputation
      daisy.ubuntu.com
      162.213.35.24
      truefalse
        high
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        107.173.129.144
        unknownUnited States
        36352AS-COLOCROSSINGUStrue
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        daisy.ubuntu.compowerpc-440fp.elfGet hashmaliciousMiraiBrowse
        • 162.213.35.25
        x86_64.elfGet hashmaliciousMiraiBrowse
        • 162.213.35.24
        arm6.elfGet hashmaliciousMiraiBrowse
        • 162.213.35.25
        armv7l.elfGet hashmaliciousMiraiBrowse
        • 162.213.35.24
        i586.elfGet hashmaliciousMiraiBrowse
        • 162.213.35.25
        2.elfGet hashmaliciousUnknownBrowse
        • 162.213.35.24
        armv6l.elfGet hashmaliciousMiraiBrowse
        • 162.213.35.25
        armv4l.elfGet hashmaliciousMiraiBrowse
        • 162.213.35.24
        mipsel.elfGet hashmaliciousMiraiBrowse
        • 162.213.35.24
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        AS-COLOCROSSINGUSDEMONS.sh4.elfGet hashmaliciousUnknownBrowse
        • 172.245.26.218
        sh4.elfGet hashmaliciousUnknownBrowse
        • 23.94.37.42
        powerpc.elfGet hashmaliciousUnknownBrowse
        • 104.168.33.8
        i586.elfGet hashmaliciousUnknownBrowse
        • 107.175.130.16
        m68k.elfGet hashmaliciousUnknownBrowse
        • 107.175.130.16
        sparc.elfGet hashmaliciousUnknownBrowse
        • 104.168.33.8
        i686.elfGet hashmaliciousUnknownBrowse
        • 107.175.130.16
        x86_64.elfGet hashmaliciousUnknownBrowse
        • 104.168.33.8
        arm.elfGet hashmaliciousUnknownBrowse
        • 107.175.130.16
        mips.elfGet hashmaliciousUnknownBrowse
        • 104.168.33.8
        No context
        No context
        No created / dropped files found
        File type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, no section header
        Entropy (8bit):4.276692563343198
        TrID:
        • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
        • ELF Executable and Linkable format (generic) (4004/1) 49.84%
        File name:cats.elf
        File size:250 bytes
        MD5:3f69f32ced51bb702e37f99b168b7501
        SHA1:6aa20482e18aef7c793ef7b62a9382f0a5faf613
        SHA256:bd4f5d6023050e6c451469ca0e1e777d55d1ef846c8b00cece7c1e29eb422698
        SHA512:615a4ecc3e4a6013a1af360e6bd45941cd3759274b509aeb31445ad1a16ccb1f7160448934e393ee300a11f2fdf9df672fcc161197fbf671fa7179490cb6ff8b
        SSDEEP:6:BnX//In8/r1uBxHocmTv+GQ3RQdygg5XJYD:BvwncrAH3mSP532D
        TLSH:99D080330B0A40FADAD4123FB574696CD77B8976574D66311890DC010C0D6146F62C75
        File Content Preview:.ELF..............>.....x.@.....@...................@.8...........................@.......@.............|...............1.j.X...H..M1.j"AZj.Z..H..xQj.AYPj)X.j._j.^..H..x;H.H....gk...QH..j.Zj*X..YH..y%I..t.Wj#Xj.j.H..H1...YY_H..y.j<Xj._..^j~Z..H..x...

        ELF header

        Class:ELF64
        Data:2's complement, little endian
        Version:1 (current)
        Machine:Advanced Micro Devices X86-64
        Version Number:0x1
        Type:EXEC (Executable file)
        OS/ABI:UNIX - System V
        ABI Version:0
        Entry Point Address:0x400078
        Flags:0x0
        ELF Header Size:64
        Program Header Offset:64
        Program Header Size:56
        Number of Program Headers:1
        Section Header Offset:0
        Section Header Size:0
        Number of Section Headers:0
        Header String Table Index:0
        TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
        LOAD0x00x4000000x4000000xfa0x17c4.27670x7RWE0x1000
        TimestampSource PortDest PortSource IPDest IP
        Jan 3, 2025 10:09:53.559421062 CET421304455192.168.2.13107.173.129.144
        Jan 3, 2025 10:09:53.564295053 CET445542130107.173.129.144192.168.2.13
        Jan 3, 2025 10:09:53.564356089 CET421304455192.168.2.13107.173.129.144
        Jan 3, 2025 10:09:54.980184078 CET445542130107.173.129.144192.168.2.13
        Jan 3, 2025 10:09:54.983479977 CET421304455192.168.2.13107.173.129.144
        Jan 3, 2025 10:09:55.135046005 CET421304455192.168.2.13107.173.129.144
        Jan 3, 2025 10:09:55.139897108 CET445542130107.173.129.144192.168.2.13
        TimestampSource PortDest PortSource IPDest IP
        Jan 3, 2025 10:09:55.664217949 CET5545153192.168.2.131.1.1.1
        Jan 3, 2025 10:09:55.664293051 CET5205653192.168.2.131.1.1.1
        Jan 3, 2025 10:09:55.670914888 CET53520561.1.1.1192.168.2.13
        Jan 3, 2025 10:09:55.671869993 CET53554511.1.1.1192.168.2.13
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Jan 3, 2025 10:09:55.664217949 CET192.168.2.131.1.1.10xd95aStandard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
        Jan 3, 2025 10:09:55.664293051 CET192.168.2.131.1.1.10x56f4Standard query (0)daisy.ubuntu.com28IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Jan 3, 2025 10:09:55.671869993 CET1.1.1.1192.168.2.130xd95aNo error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
        Jan 3, 2025 10:09:55.671869993 CET1.1.1.1192.168.2.130xd95aNo error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false

        System Behavior

        Start time (UTC):09:09:53
        Start date (UTC):03/01/2025
        Path:/tmp/cats.elf
        Arguments:/tmp/cats.elf
        File size:250 bytes
        MD5 hash:3f69f32ced51bb702e37f99b168b7501