Analysis
-
max time kernel
6s -
max time network
129s -
platform
ubuntu-22.04_amd64 -
resource
ubuntu2204-amd64-20240522.1-en -
resource tags
arch:amd64arch:i386image:ubuntu2204-amd64-20240522.1-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system -
submitted
18-02-2025 03:28
Behavioral task
behavioral1
Sample
d28f87cf63ace1509898a9bc78e7dc5b1d93bdaca0ff870fd5a57f9f5111ad07.elf
Resource
ubuntu2204-amd64-20240522.1-en
General
-
Target
d28f87cf63ace1509898a9bc78e7dc5b1d93bdaca0ff870fd5a57f9f5111ad07.elf
-
Size
418KB
-
MD5
b51230ebff286ddaee88ba6bdfb07ca6
-
SHA1
aa3926a2e53f18db867d5b94df613faca6c6c6cb
-
SHA256
d28f87cf63ace1509898a9bc78e7dc5b1d93bdaca0ff870fd5a57f9f5111ad07
-
SHA512
5afa66668c8213e00a5d1bf90acf211e1ae7012072541e48f990a8ff5ad6ea65f8004385edd9df8dc9001e2daee9a7df58ca89ea7946a8fc6146078ce50f4c85
-
SSDEEP
12288:6QIkwT+V+46MTuxN+qpMBUH5kAAxwWVtBeSg:W4/y+qaBUZJAdVt8
Malware Config
Signatures
-
Prometei
Prometei is a multiplatform botnet used to mine cryptocurrency.
-
Prometei_elf family
-
Deletes itself 1 IoCs
pid Process 1563 d28f87cf63ace1509898a9bc78e7dc5b1d93bdaca0ff870fd5a57f9f5111ad07.elf -
Modifies hosts file 1 IoCs
Adds to hosts file used for mapping hosts to IP addresses.
description ioc Process File opened for modification /etc/hosts d28f87cf63ace1509898a9bc78e7dc5b1d93bdaca0ff870fd5a57f9f5111ad07.elf -
Enumerates running processes
Discovers information about currently running processes on the system
-
Modifies systemd 2 TTPs 1 IoCs
Adds/ modifies systemd service files. Likely to achieve persistence.
description ioc Process File opened for modification /lib/systemd/system/uplugplay.service d28f87cf63ace1509898a9bc78e7dc5b1d93bdaca0ff870fd5a57f9f5111ad07.elf -
Write file to user bin folder 1 IoCs
description ioc Process File opened for modification /usr/sbin/uplugplay d28f87cf63ace1509898a9bc78e7dc5b1d93bdaca0ff870fd5a57f9f5111ad07.elf -
resource yara_rule behavioral1/files/fstream-1.dat upx -
Reads CPU attributes 1 TTPs 3 IoCs
description ioc Process File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep -
description ioc Process File opened for reading /proc/635/cmdline pgrep File opened for reading /proc/415/stat pidof File opened for reading /proc/110/cmdline pgrep File opened for reading /proc/1374/status pgrep File opened for reading /proc/9/status pgrep File opened for reading /proc/79/status pgrep File opened for reading /proc/1087/cmdline pidof File opened for reading /proc/1504/stat pidof File opened for reading /proc/14/status pgrep File opened for reading /proc/10/status pgrep File opened for reading /proc/643/status pgrep File opened for reading /proc/1561/cmdline pidof File opened for reading /proc/1176/cmdline pgrep File opened for reading /proc/1087/cmdline pgrep File opened for reading /proc/1156/stat pidof File opened for reading /proc/81/cmdline pgrep File opened for reading /proc/88/cmdline pidof File opened for reading /proc/1566/stat pidof File opened for reading /proc/407/status pgrep File opened for reading /proc/9/cmdline pidof File opened for reading /proc/19/cmdline pgrep File opened for reading /proc/1163/cmdline pgrep File opened for reading /proc/110/cmdline pidof File opened for reading /proc/88/cmdline pgrep File opened for reading /proc/5/cmdline pgrep File opened for reading /proc/1180/cmdline pgrep File opened for reading /proc/1247/stat pidof File opened for reading /proc/1165/cmdline pidof File opened for reading /proc/97/status pgrep File opened for reading /proc/73/cmdline pgrep File opened for reading /proc/1124/cmdline pidof File opened for reading /proc/18/cmdline pgrep File opened for reading /proc/643/cmdline pgrep File opened for reading /proc/1252/stat pidof File opened for reading /proc/684/stat pidof File opened for reading /proc/89/status pgrep File opened for reading /proc/85/stat pidof File opened for reading /proc/614/stat pidof File opened for reading /proc/931/status pgrep File opened for reading /proc/1131/status pgrep File opened for reading /proc/13/cmdline pgrep File opened for reading /proc/543/cmdline pgrep File opened for reading /proc/957/cmdline pgrep File opened for reading /proc/25/stat pidof File opened for reading /proc/736/stat pidof File opened for reading /proc/1227/cmdline pidof File opened for reading /proc/210/cmdline pgrep File opened for reading /proc/83/status pgrep File opened for reading /proc/13/cmdline pidof File opened for reading /proc/586/cmdline pidof File opened for reading /proc/1073/cmdline pgrep File opened for reading /proc/202/cmdline pgrep File opened for reading /proc/411/status pgrep File opened for reading /proc/1252/cmdline pgrep File opened for reading /proc/1090/cmdline pidof File opened for reading /proc/1168/cmdline pidof File opened for reading /proc/1562/cmdline pidof File opened for reading /proc/1053/status pgrep File opened for reading /proc/25/cmdline pidof File opened for reading /proc/785/cmdline pidof File opened for reading /proc/1076/cmdline pgrep File opened for reading /proc/418/stat pidof File opened for reading /proc/14/stat pidof File opened for reading /proc/199/cmdline pidof
Processes
-
/tmp/d28f87cf63ace1509898a9bc78e7dc5b1d93bdaca0ff870fd5a57f9f5111ad07.elf/tmp/d28f87cf63ace1509898a9bc78e7dc5b1d93bdaca0ff870fd5a57f9f5111ad07.elf1⤵
- Deletes itself
- Modifies hosts file
- Modifies systemd
- Write file to user bin folder
PID:1563 -
/bin/shsh -c "pgrep d28f87cf63ace1509898a9bc78e7dc5b1d93bdaca0ff870fd5a57f9f5111ad07.elf"2⤵PID:1566
-
/usr/bin/pgreppgrep d28f87cf63ace1509898a9bc78e7dc5b1d93bdaca0ff870fd5a57f9f5111ad07.elf3⤵
- Reads CPU attributes
- Reads runtime system information
PID:1567
-
-
-
/bin/shsh -c "pidof d28f87cf63ace1509898a9bc78e7dc5b1d93bdaca0ff870fd5a57f9f5111ad07.elf"2⤵PID:1579
-
/usr/bin/pidofpidof d28f87cf63ace1509898a9bc78e7dc5b1d93bdaca0ff870fd5a57f9f5111ad07.elf3⤵
- Reads runtime system information
PID:1580
-
-
-
/bin/shsh -c "pgrep uplugplay"2⤵PID:1583
-
/usr/bin/pgreppgrep uplugplay3⤵
- Reads CPU attributes
- Reads runtime system information
PID:1584
-
-
-
/bin/shsh -c "pidof uplugplay"2⤵PID:1587
-
/usr/bin/pidofpidof uplugplay3⤵
- Reads runtime system information
PID:1588
-
-
-
/bin/shsh -c "pgrep upnpsetup"2⤵PID:1591
-
/usr/bin/pgreppgrep upnpsetup3⤵
- Reads CPU attributes
- Reads runtime system information
PID:1592
-
-
-
/bin/shsh -c "pidof upnpsetup"2⤵PID:1595
-
/usr/bin/pidofpidof upnpsetup3⤵
- Reads runtime system information
PID:1596
-
-
-
/bin/shsh -c "systemctl daemon-reload"2⤵PID:1597
-
/usr/bin/systemctlsystemctl daemon-reload3⤵PID:1598
-
-
-
/bin/shsh -c "systemctl enable uplugplay.service"2⤵PID:1632
-
/usr/bin/systemctlsystemctl enable uplugplay.service3⤵PID:1633
-
-
-
/bin/shsh -c "systemctl start uplugplay.service"2⤵PID:1669
-
/usr/bin/systemctlsystemctl start uplugplay.service3⤵PID:1670
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1XDG Autostart Entries
1Create or Modify System Process
1Systemd Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145B
MD58ca62d1f47880bce036c2956c9b7b272
SHA13bcc3a5c4fcc5b0d08c4524a59f6b8e113b62060
SHA256c655d3d4e374fad38313ec4262207b2d7d68a870238f203ef3c33f85e66c8e32
SHA5124cd2d9d67151fa25e833707dee2442c4a5f752053fc2c36ec73c0e2b734c66ca69c63fceb47714d9add5b9fe2eee1e45be5199e2cae7c26173e766b333877da6
-
Filesize
418KB
MD5b51230ebff286ddaee88ba6bdfb07ca6
SHA1aa3926a2e53f18db867d5b94df613faca6c6c6cb
SHA256d28f87cf63ace1509898a9bc78e7dc5b1d93bdaca0ff870fd5a57f9f5111ad07
SHA5125afa66668c8213e00a5d1bf90acf211e1ae7012072541e48f990a8ff5ad6ea65f8004385edd9df8dc9001e2daee9a7df58ca89ea7946a8fc6146078ce50f4c85