Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
RQG7u9IH4a.elf

Overview

General Information

Sample name:RQG7u9IH4a.elf
renamed because original name is a hash value
Original sample name:e09f6bd400ba7ce4232be37e75338cb7086feff5be9d29e40014cff4b2d7e4d4.elf
Analysis ID:1520718
MD5:d06e8b6af389d64a19ffaafe99642500
SHA1:19738f5b9909c32e02c55aae6f9e45f82707ee81
SHA256:e09f6bd400ba7ce4232be37e75338cb7086feff5be9d29e40014cff4b2d7e4d4
Tags:45-124-64-27elfuser-JAMESWT_MHT
Infos:

Detection

ConnectBack
Score:80
Range:0 - 100
Whitelisted:false

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected ConnectBack
Connects to many ports of the same IP (likely port scanning)
Machine Learning detection for dropped file
Sample deletes itself
Spawns processes using file descriptor names (likely to hide the executable path or fileless malware)
Detected TCP or UDP traffic on non-standard ports
Sample has stripped symbol table
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Writes ELF files to disk

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1520718
Start date and time:2024-09-27 19:12:09 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 34s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:RQG7u9IH4a.elf
renamed because original name is a hash value
Original Sample Name:e09f6bd400ba7ce4232be37e75338cb7086feff5be9d29e40014cff4b2d7e4d4.elf
Detection:MAL
Classification:mal80.troj.evad.linELF@0/1@0/0
  • VT rate limit hit for: RQG7u9IH4a.elf
Command:/tmp/RQG7u9IH4a.elf
PID:6240
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
[kworker/8:AkZFaLl]
Standard Error:
  • system is lnxubuntu20
  • RQG7u9IH4a.elf (PID: 6240, Parent: 6164, MD5: d06e8b6af389d64a19ffaafe99642500) Arguments: /tmp/RQG7u9IH4a.elf
    • 3 (PID: 6245, Parent: 6240, MD5: 428a5618b90e0d98b96205ce2b40bf14) Arguments: [kworker/8:AkZFaLl]
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
ConnectBackConnectBack malware is a type of malicious software designed to establish unauthorized connections from an infected system to a remote server. Once a victim's device is compromised, ConnectBack creates a covert channel for communication, allowing the attacker to remotely control and gather sensitive information from the compromised system.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.connectback
SourceRuleDescriptionAuthorStrings
6245.1.0000000000400000.0000000000401000.rwx.sdmpJoeSecurity_ConnectBackYara detected ConnectBackJoe Security
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 6245.1.0000000000400000.0000000000401000.rwx.sdmpMalware Configuration Extractor: ConnectBack {"C2": "45.124.64.27:47159"}
    Source: RQG7u9IH4a.elfReversingLabs: Detection: 18%
    Source: /memfd: (deleted)Joe Sandbox ML: detected

    Networking

    barindex
    Source: global trafficTCP traffic: 45.124.64.27 ports 47159,1,4,5,7,9
    Source: global trafficTCP traffic: 192.168.2.23:44276 -> 45.124.64.27:47159
    Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
    Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
    Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.124.64.27
    Source: unknownTCP traffic detected without corresponding DNS query: 45.124.64.27
    Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
    Source: unknownTCP traffic detected without corresponding DNS query: 45.124.64.27
    Source: unknownTCP traffic detected without corresponding DNS query: 45.124.64.27
    Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
    Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
    Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
    Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
    Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
    Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
    Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443
    Source: ELF static info symbol of initial sample.symtab present: no
    Source: classification engineClassification label: mal80.troj.evad.linELF@0/1@0/0
    Source: ELF file sectionSubmission: RQG7u9IH4a.elf
    Source: /tmp/RQG7u9IH4a.elf (PID: 6240)File written: /memfd: (deleted)Jump to dropped file

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: /tmp/RQG7u9IH4a.elf (PID: 6240)File: /tmp/RQG7u9IH4a.elfJump to behavior
    Source: /tmp/RQG7u9IH4a.elf (PID: 6245)Executable: /proc/self/fd/3 -> [kworker/8:AkZFaLl]Jump to behavior

    Malware Analysis System Evasion

    barindex
    Source: /tmp/RQG7u9IH4a.elf (PID: 6245)Executable: /proc/self/fd/3 -> [kworker/8:AkZFaLl]Jump to behavior

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: 6245.1.0000000000400000.0000000000401000.rwx.sdmp, type: MEMORY

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: 6245.1.0000000000400000.0000000000401000.rwx.sdmp, type: MEMORY
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
    Hide Artifacts
    OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
    File Deletion
    LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
    Non-Standard Port
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
    Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    {"C2": "45.124.64.27:47159"}
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Number of created Files
    • Is malicious
    • Internet
    SourceDetectionScannerLabelLink
    RQG7u9IH4a.elf18%ReversingLabsWin32.Trojan.Generic
    SourceDetectionScannerLabelLink
    /memfd: (deleted)100%Joe Sandbox ML
    /memfd: (deleted)50%ReversingLabsLinux.Backdoor.Meterpreter
    No Antivirus matches
    No Antivirus matches
    No contacted domains info
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    45.124.64.27
    unknownHong Kong
    36351SOFTLAYERUStrue
    109.202.202.202
    unknownSwitzerland
    13030INIT7CHfalse
    91.189.91.43
    unknownUnited Kingdom
    41231CANONICAL-ASGBfalse
    91.189.91.42
    unknownUnited Kingdom
    41231CANONICAL-ASGBfalse
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
    • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
    91.189.91.43flow.elfGet hashmaliciousUnknownBrowse
      SecuriteInfo.com.Linux.Siggen.8107.19273.21368.elfGet hashmaliciousUnknownBrowse
        pl.arm6.elfGet hashmaliciousGafgytBrowse
          pl.mpsl.elfGet hashmaliciousGafgytBrowse
            pl.arm4.elfGet hashmaliciousGafgytBrowse
              x86.elfGet hashmaliciousUnknownBrowse
                SecuriteInfo.com.ELF.CVE-2021-4034-T.6244.4007.elfGet hashmaliciousUnknownBrowse
                  mipsel.elfGet hashmaliciousGafgyt, MiraiBrowse
                    arm61.elfGet hashmaliciousGafgyt, MiraiBrowse
                      91.189.91.42flow.elfGet hashmaliciousUnknownBrowse
                        SecuriteInfo.com.Linux.Siggen.8107.19273.21368.elfGet hashmaliciousUnknownBrowse
                          pl.arm6.elfGet hashmaliciousGafgytBrowse
                            pl.mpsl.elfGet hashmaliciousGafgytBrowse
                              pl.arm4.elfGet hashmaliciousGafgytBrowse
                                x86.elfGet hashmaliciousUnknownBrowse
                                  SecuriteInfo.com.ELF.CVE-2021-4034-T.6244.4007.elfGet hashmaliciousUnknownBrowse
                                    mipsel.elfGet hashmaliciousGafgyt, MiraiBrowse
                                      arm61.elfGet hashmaliciousGafgyt, MiraiBrowse
                                        No context
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        CANONICAL-ASGBflow.elfGet hashmaliciousUnknownBrowse
                                        • 91.189.91.42
                                        SecuriteInfo.com.Linux.Siggen.8107.19273.21368.elfGet hashmaliciousUnknownBrowse
                                        • 91.189.91.42
                                        pl.arm6.elfGet hashmaliciousGafgytBrowse
                                        • 91.189.91.42
                                        pl.mpsl.elfGet hashmaliciousGafgytBrowse
                                        • 91.189.91.42
                                        pl.arm4.elfGet hashmaliciousGafgytBrowse
                                        • 91.189.91.42
                                        http://beonlineboo.comGet hashmaliciousUnknownBrowse
                                        • 185.125.189.223
                                        i586.elfGet hashmaliciousUnknownBrowse
                                        • 185.125.190.26
                                        x86.elfGet hashmaliciousUnknownBrowse
                                        • 91.189.91.42
                                        SecuriteInfo.com.ELF.CVE-2021-4034-T.6244.4007.elfGet hashmaliciousUnknownBrowse
                                        • 91.189.91.42
                                        CANONICAL-ASGBflow.elfGet hashmaliciousUnknownBrowse
                                        • 91.189.91.42
                                        SecuriteInfo.com.Linux.Siggen.8107.19273.21368.elfGet hashmaliciousUnknownBrowse
                                        • 91.189.91.42
                                        pl.arm6.elfGet hashmaliciousGafgytBrowse
                                        • 91.189.91.42
                                        pl.mpsl.elfGet hashmaliciousGafgytBrowse
                                        • 91.189.91.42
                                        pl.arm4.elfGet hashmaliciousGafgytBrowse
                                        • 91.189.91.42
                                        http://beonlineboo.comGet hashmaliciousUnknownBrowse
                                        • 185.125.189.223
                                        i586.elfGet hashmaliciousUnknownBrowse
                                        • 185.125.190.26
                                        x86.elfGet hashmaliciousUnknownBrowse
                                        • 91.189.91.42
                                        SecuriteInfo.com.ELF.CVE-2021-4034-T.6244.4007.elfGet hashmaliciousUnknownBrowse
                                        • 91.189.91.42
                                        INIT7CHflow.elfGet hashmaliciousUnknownBrowse
                                        • 109.202.202.202
                                        SecuriteInfo.com.Linux.Siggen.8107.19273.21368.elfGet hashmaliciousUnknownBrowse
                                        • 109.202.202.202
                                        pl.arm6.elfGet hashmaliciousGafgytBrowse
                                        • 109.202.202.202
                                        pl.mpsl.elfGet hashmaliciousGafgytBrowse
                                        • 109.202.202.202
                                        pl.arm4.elfGet hashmaliciousGafgytBrowse
                                        • 109.202.202.202
                                        x86.elfGet hashmaliciousUnknownBrowse
                                        • 109.202.202.202
                                        SecuriteInfo.com.ELF.CVE-2021-4034-T.6244.4007.elfGet hashmaliciousUnknownBrowse
                                        • 109.202.202.202
                                        mipsel.elfGet hashmaliciousGafgyt, MiraiBrowse
                                        • 109.202.202.202
                                        arm61.elfGet hashmaliciousGafgyt, MiraiBrowse
                                        • 109.202.202.202
                                        SOFTLAYERUShttps://uhcdenal.com/Get hashmaliciousUnknownBrowse
                                        • 52.116.53.155
                                        z65orderrequest.bat.exeGet hashmaliciousGuLoader, RemcosBrowse
                                        • 43.226.229.233
                                        SecuriteInfo.com.Linux.Siggen.9999.1529.24643.elfGet hashmaliciousUnknownBrowse
                                        • 169.63.50.112
                                        http://pub-d64d63bc9b0049929bfeb3afd89bfb4d.r2.dev/file.htmlGet hashmaliciousHTMLPhisherBrowse
                                        • 169.55.190.245
                                        Awb_Shipping_Documents_BL_Invoice_Packinglist_0000000000000000000000pdf.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                        • 172.111.137.137
                                        http://pub-d64d63bc9b0049929bfeb3afd89bfb4d.r2.dev/file.htmlGet hashmaliciousHTMLPhisherBrowse
                                        • 169.55.190.245
                                        SecuriteInfo.com.Linux.Siggen.9999.32167.12194.elfGet hashmaliciousUnknownBrowse
                                        • 70.87.118.83
                                        SecuriteInfo.com.Linux.Siggen.9999.11593.30273.elfGet hashmaliciousUnknownBrowse
                                        • 173.192.57.8
                                        http://17ebook.comGet hashmaliciousUnknownBrowse
                                        • 52.116.53.155
                                        https://bankllist.usGet hashmaliciousUnknownBrowse
                                        • 52.116.53.150
                                        No context
                                        No context
                                        Process:/tmp/RQG7u9IH4a.elf
                                        File Type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, no section header
                                        Category:dropped
                                        Size (bytes):295
                                        Entropy (8bit):5.309859275769177
                                        Encrypted:false
                                        SSDEEP:6:BnX//In8/r1aklZRRzvO2+vVo1LvqeR552m1yKcyBHKRec:BvwncrQ6T6nVoBvvRn2m1Byec
                                        MD5:428A5618B90E0D98B96205CE2B40BF14
                                        SHA1:A14953444955B6049D402BB5445D25A9EA794C9A
                                        SHA-256:D75994684D5BC04028DCA45E93E58F716E06F69F173CF4AB47F9C68D5436A247
                                        SHA-512:11FAF46CC55E07B01A36B1F57BEBF5D8EAA740A1F4D96DF197672985D73AAEA05C7F9CC9C110E785703DC4B986AFC056BBD53382F960AAD29AA2AA81E49C319A
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                        • Antivirus: ReversingLabs, Detection: 50%
                                        Reputation:low
                                        Preview:.ELF..............>.....x.@.....@...................@.8...........................@.......@.....'.......................H1.H......H......H..a.L...H1X'H-..............0.}A`..;......F...&.K.........`..I..y.Z.?.1..{V....[.J..... ..d...Hs.../.T.`.....I..^.P..I.S..&..6.`..I.`.n...HrT<..L...
                                        File type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, Go BuildID=dVWbo_pAVcVsrKUMrkUE/EqRjtXx7CGIFRuBWWLnb/tfTDuGvBVS2n_i2CYGkD/vWGbYUxMNx08ySmiDjaL, stripped
                                        Entropy (8bit):6.007053691078284
                                        TrID:
                                        • ELF Executable and Linkable format (Linux) (4029/14) 49.77%
                                        • ELF Executable and Linkable format (generic) (4004/1) 49.46%
                                        • Lumena CEL bitmap (63/63) 0.78%
                                        File name:RQG7u9IH4a.elf
                                        File size:1'437'696 bytes
                                        MD5:d06e8b6af389d64a19ffaafe99642500
                                        SHA1:19738f5b9909c32e02c55aae6f9e45f82707ee81
                                        SHA256:e09f6bd400ba7ce4232be37e75338cb7086feff5be9d29e40014cff4b2d7e4d4
                                        SHA512:76a4e173a991f1ad6cfb060181f8c7c485a698b2735314cc38175c180463984cca1f5039ba1bdf8e4d9a53c91ead369b13c227f5208e77e7cb4704d8cd30610a
                                        SSDEEP:24576:mf4/zgPJrtFrb/TbvO90dL3BmAFd4A64nsfJvOW/iB5l3geEoWvBzP9CD1P:mf4/zMJvrb/TbvO90dL3BmAFd4A64nsS
                                        TLSH:2D653A47BC9091A6C1AA9232896692D27B707C580F3063D33B51B7FD2F36BE85E75318
                                        File Content Preview:.ELF..............>.......E.....@...................@.8...@.............@.......@.@.....@.@...............................................@.......@.....d.......d.................................@.......@.....%.......%.................................J....

                                        ELF header

                                        Class:ELF64
                                        Data:2's complement, little endian
                                        Version:1 (current)
                                        Machine:Advanced Micro Devices X86-64
                                        Version Number:0x1
                                        Type:EXEC (Executable file)
                                        OS/ABI:UNIX - System V
                                        ABI Version:0
                                        Entry Point Address:0x45f2a0
                                        Flags:0x0
                                        ELF Header Size:64
                                        Program Header Offset:64
                                        Program Header Size:56
                                        Number of Program Headers:7
                                        Section Header Offset:456
                                        Section Header Size:64
                                        Number of Section Headers:14
                                        Header String Table Index:3
                                        NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                        NULL0x00x00x00x00x0000
                                        .textPROGBITS0x4010000x10000x9e2250x00x6AX0032
                                        .rodataPROGBITS0x4a00000xa00000x3ec3f0x00x2A0032
                                        .shstrtabSTRTAB0x00xdec400xa50x00x0001
                                        .typelinkPROGBITS0x4ded000xded000x5dc0x00x2A0032
                                        .itablinkPROGBITS0x4df2e00xdf2e00xc00x00x2A0032
                                        .gosymtabPROGBITS0x4df3a00xdf3a00x00x00x2A001
                                        .gopclntabPROGBITS0x4df3a00xdf3a00x637f80x00x2A0032
                                        .go.buildinfoPROGBITS0x5430000x1430000x1300x00x3WA0016
                                        .noptrdataPROGBITS0x5431400x1431400x136a00x00x3WA0032
                                        .dataPROGBITS0x5567e00x1567e00x7cf00x00x3WA0032
                                        .bssNOBITS0x55e4e00x15e4e00x2f1c00x00x3WA0032
                                        .noptrbssNOBITS0x58d6a00x18d6a00x52080x00x3WA0032
                                        .note.go.buildidNOTE0x400f9c0xf9c0x640x00x2A004
                                        TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                        PHDR0x400x4000400x4000400x1880x1881.59440x4R 0x1000
                                        NOTE0xf9c0x400f9c0x400f9c0x640x645.27230x4R 0x4.note.go.buildid
                                        LOAD0x00x4000000x4000000x9f2250x9f2256.13810x5R E0x1000.text .note.go.buildid
                                        LOAD0xa00000x4a00000x4a00000xa2b980xa2b985.41300x4R 0x1000.rodata .typelink .itablink .gosymtab .gopclntab
                                        LOAD0x1430000x5430000x5430000x1b4e00x4f8a84.72970x6RW 0x1000.go.buildinfo .noptrdata .data .bss .noptrbss
                                        GNU_STACK0x00x00x00x00x00.00000x6RW 0x8
                                        LOOS+50415800x00x00x00x00x00.00000x2a00 0x8
                                        TimestampSource PortDest PortSource IPDest IP
                                        Sep 27, 2024 19:12:54.267345905 CEST4427647159192.168.2.2345.124.64.27
                                        Sep 27, 2024 19:12:54.272650957 CEST471594427645.124.64.27192.168.2.23
                                        Sep 27, 2024 19:12:54.272717953 CEST4427647159192.168.2.2345.124.64.27
                                        Sep 27, 2024 19:12:55.976108074 CEST43928443192.168.2.2391.189.91.42
                                        Sep 27, 2024 19:12:56.283092976 CEST471594427645.124.64.27192.168.2.23
                                        Sep 27, 2024 19:12:56.283729076 CEST4427647159192.168.2.2345.124.64.27
                                        Sep 27, 2024 19:12:56.542745113 CEST4427647159192.168.2.2345.124.64.27
                                        Sep 27, 2024 19:12:56.547836065 CEST471594427645.124.64.27192.168.2.23
                                        Sep 27, 2024 19:13:01.351156950 CEST42836443192.168.2.2391.189.91.43
                                        Sep 27, 2024 19:13:02.630997896 CEST4251680192.168.2.23109.202.202.202
                                        Sep 27, 2024 19:13:16.453036070 CEST43928443192.168.2.2391.189.91.42
                                        Sep 27, 2024 19:13:28.739269972 CEST42836443192.168.2.2391.189.91.43
                                        Sep 27, 2024 19:13:32.834789991 CEST4251680192.168.2.23109.202.202.202
                                        Sep 27, 2024 19:13:57.407285929 CEST43928443192.168.2.2391.189.91.42

                                        System Behavior

                                        Start time (UTC):17:12:53
                                        Start date (UTC):27/09/2024
                                        Path:/tmp/RQG7u9IH4a.elf
                                        Arguments:/tmp/RQG7u9IH4a.elf
                                        File size:1437696 bytes
                                        MD5 hash:d06e8b6af389d64a19ffaafe99642500

                                        Start time (UTC):17:12:53
                                        Start date (UTC):27/09/2024
                                        Path:/tmp/RQG7u9IH4a.elf
                                        Arguments:-
                                        File size:1437696 bytes
                                        MD5 hash:d06e8b6af389d64a19ffaafe99642500

                                        Start time (UTC):17:12:53
                                        Start date (UTC):27/09/2024
                                        Path:/proc/self/fd/3
                                        Arguments:[kworker/8:AkZFaLl]
                                        File size:295 bytes
                                        MD5 hash:428a5618b90e0d98b96205ce2b40bf14