Linux Analysis Report
eWOLEi2hJg.elf

Overview

General Information

Sample name: eWOLEi2hJg.elf
renamed because original name is a hash value
Original sample name: d75994684d5bc04028dca45e93e58f716e06f69f173cf4ab47f9c68d5436a247.elf
Analysis ID: 1520719
MD5: 428a5618b90e0d98b96205ce2b40bf14
SHA1: a14953444955b6049d402bb5445d25a9ea794c9a
SHA256: d75994684d5bc04028dca45e93e58f716e06f69f173cf4ab47f9c68d5436a247
Tags: 45-124-64-27elfuser-JAMESWT_MHT
Infos:

Detection

ConnectBack
Score: 72
Range: 0 - 100
Whitelisted: false

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected ConnectBack
Connects to many ports of the same IP (likely port scanning)
Machine Learning detection for sample
Detected TCP or UDP traffic on non-standard ports
Sample contains only a LOAD segment without any section mappings

Classification

Name Description Attribution Blogpost URLs Link
ConnectBack ConnectBack malware is a type of malicious software designed to establish unauthorized connections from an infected system to a remote server. Once a victim's device is compromised, ConnectBack creates a covert channel for communication, allowing the attacker to remotely control and gather sensitive information from the compromised system. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/elf.connectback

AV Detection

barindex
Source: 5435.1.0000000000400000.0000000000401000.rwx.sdmp Malware Configuration Extractor: ConnectBack {"C2": "45.124.64.27:47159"}
Source: eWOLEi2hJg.elf ReversingLabs: Detection: 50%
Source: eWOLEi2hJg.elf Joe Sandbox ML: detected

Networking

barindex
Source: global traffic TCP traffic: 45.124.64.27 ports 47159,1,4,5,7,9
Source: global traffic TCP traffic: 192.168.2.13:53150 -> 45.124.64.27:47159
Source: unknown TCP traffic detected without corresponding DNS query: 45.124.64.27
Source: unknown TCP traffic detected without corresponding DNS query: 45.124.64.27
Source: unknown TCP traffic detected without corresponding DNS query: 45.124.64.27
Source: unknown TCP traffic detected without corresponding DNS query: 45.124.64.27
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global traffic DNS traffic detected: DNS query: daisy.ubuntu.com
Source: LOAD without section mappings Program segment: 0x400000
Source: classification engine Classification label: mal72.troj.linELF@0/0@2/0

Stealing of Sensitive Information

barindex
Source: Yara match File source: 5435.1.0000000000400000.0000000000401000.rwx.sdmp, type: MEMORY

Remote Access Functionality

barindex
Source: Yara match File source: 5435.1.0000000000400000.0000000000401000.rwx.sdmp, type: MEMORY
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs