🔍 Auto‑color ELF Malware Analysis Report

📄 Executive Summary

Auto‑color is a 64-bit ELF malware targeting Linux systems. First observed in April 2025, it uses LD_PRELOAD injection for persistence, drops auxiliary payloads under /var/log/cross/, and connects to a C2 domain check.linux-kernel.xyz. It performs privilege escalation, reads sensitive files, and modifies file permissions to maintain stealth and control.

C2 Domain: check.linux-kernel.xyz
IP: 18.167.12.195
Communication Port: 5353 (abused)

🧬 Malware Overview

⚙️ Infection & Execution Flow

Execution Flow

Initial Execution:

Behavioral Flow:

  1. Reads passwd and other profile files /etc/passwd
  2. Creates directory and files under /var/log/cross/
  3. Drops malicious shared object: libcext.so.2
  4. Modifies ld.so.preload for persistence/etc/ld.so.preload
  5. Spawns shell processes: bash, dash, locale-check

📦 Static Analysis

Hashes:

MD5: a30f5c43b437c940a4d5e940d37106ca
SHA1: f91623fa3d8c69b0a3fc1ed2172290af492be37b
SHA256: e463921880458ee1de65cc3f77ae07a3b9a3ae151de8b6c52ea382c8d6146b0f
    

🧪 Dynamic Behavior

🌐 Network Activity

🛑 Indicators of Compromise (IOCs)

File Paths:

🎯 MITRE ATT&CK Techniques

🔐 Mitigation & Recommendations

🕵️‍♂️ Real-World Case: SAP NetWeaver Exploit

In April 2025, attackers exploited CVE-2025-31324 (SAP NetWeaver) to deliver Auto‑color malware to a U.S. chemicals company. This marked the first observed use of an SAP RCE flaw to deploy the ELF backdoor.

Attack Timeline:

The malware suppressed its malicious activity if C2 was unreachable, appearing benign and evading detection. This shows an advanced level of evasion logic and adaptive behavior.

✅ Conclusion

Auto‑color is a stealthy Linux ELF malware using LD_PRELOAD hijacking, stripped binaries, and system path masquerading. Its capabilities make it highly resilient and difficult to detect. Organizations should strengthen file integrity monitoring, patch management, and network egress controls to mitigate such threats.