Malware Analysis Report

2025-06-16 02:03

Sample ID 250222-c2rprawqbk
Target 10332974948607d2d8633790d40cfb65974a906bfdfcbab74329ab424fb36cfd.elf
SHA256 10332974948607d2d8633790d40cfb65974a906bfdfcbab74329ab424fb36cfd
Tags
upx prometei_elf botnet discovery miner persistence privilege_escalation
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

10332974948607d2d8633790d40cfb65974a906bfdfcbab74329ab424fb36cfd

Threat Level: Known bad

The file 10332974948607d2d8633790d40cfb65974a906bfdfcbab74329ab424fb36cfd.elf was found to be: Known bad.

Malicious Activity Summary

upx prometei_elf botnet discovery miner persistence privilege_escalation

Prometei

Prometei_elf family

Modifies hosts file

Deletes itself

Enumerates running processes

Modifies systemd

Write file to user bin folder

UPX packed file

Reads CPU attributes

Reads runtime system information

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2025-02-22 02:34

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2025-02-22 02:34

Reported

2025-02-22 02:37

Platform

ubuntu2204-amd64-20240611-en

Max time kernel

7s

Max time network

128s

Command Line

[/tmp/10332974948607d2d8633790d40cfb65974a906bfdfcbab74329ab424fb36cfd.elf]

Signatures

Prometei

botnet miner prometei_elf

Prometei_elf family

prometei_elf

Deletes itself

Description Indicator Process Target
N/A N/A /tmp/10332974948607d2d8633790d40cfb65974a906bfdfcbab74329ab424fb36cfd.elf N/A

Modifies hosts file

Description Indicator Process Target
File opened for modification /etc/hosts /tmp/10332974948607d2d8633790d40cfb65974a906bfdfcbab74329ab424fb36cfd.elf N/A

Enumerates running processes

Modifies systemd

persistence privilege_escalation
Description Indicator Process Target
File opened for modification /lib/systemd/system/uplugplay.service /tmp/10332974948607d2d8633790d40cfb65974a906bfdfcbab74329ab424fb36cfd.elf N/A

Write file to user bin folder

persistence
Description Indicator Process Target
File opened for modification /usr/sbin/uplugplay /tmp/10332974948607d2d8633790d40cfb65974a906bfdfcbab74329ab424fb36cfd.elf N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Reads CPU attributes

discovery
Description Indicator Process Target
File opened for reading /sys/devices/system/cpu/online /usr/bin/pgrep N/A
File opened for reading /sys/devices/system/cpu/online /usr/bin/pgrep N/A
File opened for reading /sys/devices/system/cpu/online /usr/bin/pgrep N/A

Reads runtime system information

discovery
Description Indicator Process Target
File opened for reading /proc/1058/stat /usr/bin/pidof N/A
File opened for reading /proc/21/status /usr/bin/pgrep N/A
File opened for reading /proc/1090/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/82/cmdline /usr/bin/pidof N/A
File opened for reading /proc/427/cmdline /usr/bin/pidof N/A
File opened for reading /proc/1066/stat /usr/bin/pidof N/A
File opened for reading /proc/1163/stat /usr/bin/pidof N/A
File opened for reading /proc/315/status /usr/bin/pgrep N/A
File opened for reading /proc/1364/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/82/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/406/status /usr/bin/pgrep N/A
File opened for reading /proc/1057/status /usr/bin/pgrep N/A
File opened for reading /proc/1187/stat /usr/bin/pidof N/A
File opened for reading /proc/590/cmdline /usr/bin/pidof N/A
File opened for reading /proc/85/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/1549/stat /usr/bin/pidof N/A
File opened for reading /proc/203/cmdline /usr/bin/pidof N/A
File opened for reading /proc/608/stat /usr/bin/pidof N/A
File opened for reading /proc/845/cmdline /usr/bin/pidof N/A
File opened for reading /proc/7/cmdline /usr/bin/pidof N/A
File opened for reading /proc/8/stat /usr/bin/pidof N/A
File opened for reading /proc/683/status /usr/bin/pgrep N/A
File opened for reading /proc/416/status /usr/bin/pgrep N/A
File opened for reading /proc/764/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/99/cmdline /usr/bin/pidof N/A
File opened for reading /proc/1454/cmdline /usr/bin/pidof N/A
File opened for reading /proc/991/cmdline /usr/bin/pidof N/A
File opened for reading /proc/1092/cmdline /usr/bin/pidof N/A
File opened for reading /proc/1454/status /usr/bin/pgrep N/A
File opened for reading /proc/23/cmdline /usr/bin/pidof N/A
File opened for reading /proc/1161/status /usr/bin/pgrep N/A
File opened for reading /proc/1561/stat /usr/bin/pidof N/A
File opened for reading /proc/416/cmdline /usr/bin/pidof N/A
File opened for reading /proc/98/status /usr/bin/pgrep N/A
File opened for reading /proc/411/status /usr/bin/pgrep N/A
File opened for reading /proc/1088/stat /usr/bin/pidof N/A
File opened for reading /proc/991/status /usr/bin/pgrep N/A
File opened for reading /proc/1150/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/775/cmdline /usr/bin/pidof N/A
File opened for reading /proc/608/cmdline /usr/bin/pidof N/A
File opened for reading /proc/uptime /usr/bin/pgrep N/A
File opened for reading /proc/749/stat /usr/bin/pidof N/A
File opened for reading /proc/83/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/1178/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/594/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/610/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/23/cmdline /usr/bin/pidof N/A
File opened for reading /proc/1201/stat /usr/bin/pidof N/A
File opened for reading /proc/82/status /usr/bin/pgrep N/A
File opened for reading /proc/85/cmdline /usr/bin/pidof N/A
File opened for reading /proc/992/cmdline /usr/bin/pidof N/A
File opened for reading /proc/1103/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/1561/cmdline /usr/bin/pidof N/A
File opened for reading /proc/self/auxv /usr/bin/pgrep N/A
File opened for reading /proc/110/cmdline /usr/bin/pidof N/A
File opened for reading /proc/610/status /usr/bin/pgrep N/A
File opened for reading /proc/748/status /usr/bin/pgrep N/A
File opened for reading /proc/1231/cmdline /usr/bin/pidof N/A
File opened for reading /proc/225/status /usr/bin/pgrep N/A
File opened for reading /proc/315/cmdline /usr/bin/pidof N/A
File opened for reading /proc/1137/cmdline /usr/bin/pidof N/A
File opened for reading /proc/11/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/75/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/984/stat /usr/bin/pidof N/A

Processes

/tmp/10332974948607d2d8633790d40cfb65974a906bfdfcbab74329ab424fb36cfd.elf

[/tmp/10332974948607d2d8633790d40cfb65974a906bfdfcbab74329ab424fb36cfd.elf]

/bin/sh

[sh -c pgrep 10332974948607d2d8633790d40cfb65974a906bfdfcbab74329ab424fb36cfd.elf]

/usr/bin/pgrep

[pgrep 10332974948607d2d8633790d40cfb65974a906bfdfcbab74329ab424fb36cfd.elf]

/bin/sh

[sh -c pidof 10332974948607d2d8633790d40cfb65974a906bfdfcbab74329ab424fb36cfd.elf]

/usr/bin/pidof

[pidof 10332974948607d2d8633790d40cfb65974a906bfdfcbab74329ab424fb36cfd.elf]

/bin/sh

[sh -c pgrep uplugplay]

/usr/bin/pgrep

[pgrep uplugplay]

/bin/sh

[sh -c pidof uplugplay]

/usr/bin/pidof

[pidof uplugplay]

/bin/sh

[sh -c pgrep upnpsetup]

/usr/bin/pgrep

[pgrep upnpsetup]

/bin/sh

[sh -c pidof upnpsetup]

/usr/bin/pidof

[pidof upnpsetup]

/bin/sh

[sh -c systemctl daemon-reload]

/usr/bin/systemctl

[systemctl daemon-reload]

/bin/sh

[sh -c systemctl enable uplugplay.service]

/usr/bin/systemctl

[systemctl enable uplugplay.service]

/bin/sh

[sh -c systemctl start uplugplay.service]

/usr/bin/systemctl

[systemctl start uplugplay.service]

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 p3.feefreepool.net udp
DE 88.198.246.242:80 p3.feefreepool.net tcp

Files

memory/1572-1-0x0000000000400000-0x00000000015640f8-memory.dmp

/usr/sbin/uplugplay

MD5 1ce5f9c75695e58fdd99227fc81a8051
SHA1 ba677e35345bf76c6ca4efdeaace1cdced13f941
SHA256 10332974948607d2d8633790d40cfb65974a906bfdfcbab74329ab424fb36cfd
SHA512 e73718269693533058aa89b1df5ceda23599b99ffb438d1a80efb41c9308fab3ceddd633244aeb2189ed9958dcf9b1d8c6bdf6e05d75c3386c42f5ae475d4c30

/usr/lib/systemd/system/uplugplay.service

MD5 8ca62d1f47880bce036c2956c9b7b272
SHA1 3bcc3a5c4fcc5b0d08c4524a59f6b8e113b62060
SHA256 c655d3d4e374fad38313ec4262207b2d7d68a870238f203ef3c33f85e66c8e32
SHA512 4cd2d9d67151fa25e833707dee2442c4a5f752053fc2c36ec73c0e2b734c66ca69c63fceb47714d9add5b9fe2eee1e45be5199e2cae7c26173e766b333877da6