| File name: | auto_color.elf |
| Full analysis: | https://app.any.run/tasks/1c7c4fc0-af11-44c9-b45e-b7cbe82ea002 |
| Verdict: | Malicious activity |
| Threats: | A backdoor is a type of cybersecurity threat that allows attackers to secretly compromise a system and conduct malicious activities, such as stealing data and modifying files. Backdoors can be difficult to detect, as they often use legitimate system applications to evade defense mechanisms. Threat actors often utilize special malware, such as PlugX, to establish backdoors on target devices. |
| Analysis date: | April 19, 2025, 11:26:30 |
| OS: | Ubuntu 22.04.2 |
| Tags: | |
| Indicators: | |
| MIME: | application/x-pie-executable |
| File info: | ELF 64-bit LSB pie executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=08a8401aef311e569e8bcbc3b46829560334ec0a, for GNU/Linux 3.2.0, stripped |
| MD5: | A30F5C43B437C940A4D5E940D37106CA |
| SHA1: | F91623FA3D8C69B0A3FC1ED2172290AF492BE37B |
| SHA256: | E463921880458EE1DE65CC3F77AE07A3B9A3AE151DE8B6C52EA382C8D6146B0F |
| SSDEEP: | 1536:S2AYDjMunnwrPqfMAuuHFGYa865MzFN4brZHh4lX32uHYj/M2ql:S9eLnnwDqfMAuuHFGYz6KN44n2uHNN |
| .o | | | ELF Executable and Linkable format (generic) (49.8) |
|---|
| CPUArchitecture: | 64 bit |
|---|---|
| CPUByteOrder: | Little endian |
| ObjectFileType: | Shared object file |
| CPUType: | AMD x86-64 |
PID | CMD | Path | Indicators | Parent process |
|---|---|---|---|---|
| 39496 | /bin/sh -c "sudo chown user /home/user/Desktop/auto_color\.elf && chmod +x /home/user/Desktop/auto_color\.elf && DISPLAY=:0 sudo -i /home/user/Desktop/auto_color\.elf " | /usr/bin/dash | — | any-guest-agent |
User: user Integrity Level: UNKNOWN | ||||
| 39497 | sudo chown user /home/user/Desktop/auto_color.elf | /usr/bin/sudo | — | dash |
User: root Integrity Level: UNKNOWN Exit code: 0 | ||||
| 39498 | systemctl --user --global is-enabled snap.snapd-desktop-integration.snapd-desktop-integration.service | /usr/bin/systemctl | — | snapd |
User: root Integrity Level: UNKNOWN Exit code: 0 | ||||
| 39499 | chown user /home/user/Desktop/auto_color.elf | /usr/bin/chown | — | sudo |
User: root Integrity Level: UNKNOWN Exit code: 0 | ||||
| 39500 | chmod +x /home/user/Desktop/auto_color.elf | /usr/bin/chmod | — | dash |
User: user Integrity Level: UNKNOWN Exit code: 0 | ||||
| 39501 | sudo -i /home/user/Desktop/auto_color.elf | /usr/bin/sudo | — | dash |
User: root Integrity Level: UNKNOWN | ||||
| 39503 | /home/user/Desktop/auto_color.elf | /home/user/Desktop/auto_color.elf | sudo | |
User: root Integrity Level: UNKNOWN | ||||
| 39504 | /usr/bin/locale-check C.UTF-8 | /usr/bin/locale-check | — | auto_color.elf |
User: root Integrity Level: UNKNOWN Exit code: 0 | ||||
| 39505 | -bash --login -c \/home\/user\/Desktop\/auto_color\.elf | /usr/bin/bash | — | auto_color.elf |
User: root Integrity Level: UNKNOWN Exit code: 0 | ||||
| 39506 | sh -c "cat /usr/etc/debuginfod/*\.urls 2>/dev/null" | /usr/bin/dash | — | bash |
User: root Integrity Level: UNKNOWN Exit code: 256 | ||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 39503 | auto_color.elf | /var/log/cross/auto-color | binary | |
MD5:— | SHA256:— | |||
| 39503 | auto_color.elf | /usr/lib/x86_64-linux-gnu/libcext.so.2 | binary | |
MD5:— | SHA256:— | |||
| 39503 | auto_color.elf | /etc/ld.so.preload | text | |
MD5:— | SHA256:— | |||
| 39503 | auto_color.elf | /var/log/cross/0/config-err-7500b1b | binary | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | POST | 200 | 185.125.188.58:443 | https://api.snapcraft.io/api/v1/snaps/auth/sessions | unknown | binary | 587 b | whitelisted |
— | — | POST | 200 | 185.125.188.54:443 | https://api.snapcraft.io/api/v1/snaps/auth/nonces | unknown | binary | 53 b | whitelisted |
— | — | POST | 200 | 185.125.188.55:443 | https://api.snapcraft.io/api/v1/snaps/auth/nonces | unknown | binary | 53 b | whitelisted |
— | — | POST | 200 | 185.125.188.59:443 | https://api.snapcraft.io/v2/snaps/refresh | unknown | binary | 45.5 Kb | whitelisted |
— | — | POST | 200 | 185.125.188.58:443 | https://api.snapcraft.io/v2/snaps/refresh | unknown | binary | 45.4 Kb | whitelisted |
— | — | POST | 200 | 185.125.188.55:443 | https://api.snapcraft.io/api/v1/snaps/auth/sessions | unknown | binary | 587 b | whitelisted |
— | — | POST | 200 | 185.125.188.59:443 | https://api.snapcraft.io/v2/snaps/refresh | unknown | binary | 45.4 Kb | whitelisted |
— | — | GET | — | 185.125.190.49:80 | http://connectivity-check.ubuntu.com/ | unknown | — | — | whitelisted |
— | — | GET | 204 | 185.125.190.49:80 | http://connectivity-check.ubuntu.com/ | unknown | — | — | whitelisted |
— | — | GET | — | 185.125.190.49:80 | http://connectivity-check.ubuntu.com/ | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
484 | avahi-daemon | 224.0.0.251:5353 | — | — | — | unknown |
— | — | 185.125.190.49:80 | connectivity-check.ubuntu.com | Canonical Group Limited | GB | whitelisted |
— | — | 169.150.255.181:443 | odrs.gnome.org | — | GB | whitelisted |
— | — | 185.125.188.54:443 | api.snapcraft.io | Canonical Group Limited | GB | whitelisted |
— | — | 185.125.188.58:443 | api.snapcraft.io | Canonical Group Limited | GB | whitelisted |
39503 | auto_color.elf | 18.167.12.195:5353 | check.linux-kernel.xyz | AMAZON-02 | HK | unknown |
Domain | IP | Reputation |
|---|---|---|
connectivity-check.ubuntu.com |
| whitelisted |
odrs.gnome.org |
| whitelisted |
api.snapcraft.io |
| whitelisted |
google.com |
| whitelisted |
check.linux-kernel.xyz |
| unknown |
10.100.168.192.in-addr.arpa |
| unknown |