Auto‑color is a 64-bit ELF malware targeting Linux systems. First observed in April 2025, it uses LD_PRELOAD injection for persistence, drops auxiliary payloads under /var/log/cross/, and connects to a C2 domain check.linux-kernel.xyz.
It performs privilege escalation, reads sensitive files, and modifies file permissions to maintain stealth and control.
C2 Domain: check.linux-kernel.xyz IP: 18.167.12.195 Communication Port: 5353 (abused)
🧬 Malware Overview
Name: Auto‑color (auto_color.elf)
Type: Linux Backdoor / LD_PRELOAD Malware
Platform: Ubuntu Linux (22.04.2 tested)
Format: ELF 64‑bit, dynamically linked, stripped
Size: ~216 KB
First Seen: April 19, 2025
Interpreter: /lib64/ld-linux-x86-64.so.2
⚙️ Infection & Execution Flow
Initial Execution:
Executed via sudo with root privileges
Run from a parent shell using: chown + chmod +x + sudo -i ./auto_color.elf
Behavioral Flow:
Reads passwd and other profile files /etc/passwd
Creates directory and files under /var/log/cross/
Drops malicious shared object: libcext.so.2
Modifies ld.so.preload for persistence/etc/ld.so.preload
Monitor below file for unauthorized changes/etc/ld.so.preload
Block IP Below IP and Domain: 18.167.12.195check.linux-kernel.xyz
Inspect below port for abnormal outbound connections5353
Delete all the files located in below path /var/log/cross/libcext.so.2
Reimage systems if full cleanup is uncertain
🕵️♂️ Real-World Case: SAP NetWeaver Exploit
In April 2025, attackers exploited CVE-2025-31324 (SAP NetWeaver) to deliver Auto‑color malware to a U.S. chemicals company. This marked the first observed use of an SAP RCE flaw to deploy the ELF backdoor.
Attack Timeline:
April 25: SAP scanning and exploitation began
April 27: Payload download and DNS tunneling activity
April 28: Auto‑color executed with root privileges
The malware suppressed its malicious activity if C2 was unreachable, appearing benign and evading detection. This shows an advanced level of evasion logic and adaptive behavior.
✅ Conclusion
Auto‑color is a stealthy Linux ELF malware using LD_PRELOAD hijacking, stripped binaries, and system path masquerading. Its capabilities make it highly resilient and difficult to detect. Organizations should strengthen file integrity monitoring, patch management, and network egress controls to mitigate such threats.