Analysis
-
max time kernel
6s -
max time network
128s -
platform
ubuntu-22.04_amd64 -
resource
ubuntu2204-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu2204-amd64-20240611-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system -
submitted
22/02/2025, 02:37
Behavioral task
behavioral1
Sample
14232438205da881ecb6dd38c74699e15ba9ba59ed208b2980f3f1b8558265f4.elf
Resource
ubuntu2204-amd64-20240611-en
General
-
Target
14232438205da881ecb6dd38c74699e15ba9ba59ed208b2980f3f1b8558265f4.elf
-
Size
418KB
-
MD5
6e4fd7ad98aa58ae7f9bea135cd0a166
-
SHA1
9a825cc994e2e6b4d79b43a1c8bb5ea6a07b3eea
-
SHA256
14232438205da881ecb6dd38c74699e15ba9ba59ed208b2980f3f1b8558265f4
-
SHA512
5f0b113d6d560792fe1223ca867a147df7c889798ff5ac8e6bbbc8772b9803998863c764d3682381120baf1daa7308505dad77ead713da65a965af9661f52555
-
SSDEEP
12288:6QIkwT+V+46MTuxN+qpMBUH5kAAxwWVtBeSE:W4/y+qaBUZJAdVtw
Malware Config
Signatures
-
Prometei
Prometei is a multiplatform botnet used to mine cryptocurrency.
-
Prometei_elf family
-
Deletes itself 1 IoCs
pid Process 1565 14232438205da881ecb6dd38c74699e15ba9ba59ed208b2980f3f1b8558265f4.elf -
Modifies hosts file 1 IoCs
Adds to hosts file used for mapping hosts to IP addresses.
description ioc Process File opened for modification /etc/hosts 14232438205da881ecb6dd38c74699e15ba9ba59ed208b2980f3f1b8558265f4.elf -
Enumerates running processes
Discovers information about currently running processes on the system
-
Modifies systemd 2 TTPs 1 IoCs
Adds/ modifies systemd service files. Likely to achieve persistence.
description ioc Process File opened for modification /lib/systemd/system/uplugplay.service 14232438205da881ecb6dd38c74699e15ba9ba59ed208b2980f3f1b8558265f4.elf -
Write file to user bin folder 1 IoCs
description ioc Process File opened for modification /usr/sbin/uplugplay 14232438205da881ecb6dd38c74699e15ba9ba59ed208b2980f3f1b8558265f4.elf -
resource yara_rule behavioral1/files/fstream-1.dat upx -
Reads CPU attributes 1 TTPs 3 IoCs
description ioc Process File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep -
description ioc Process File opened for reading /proc/86/cmdline pgrep File opened for reading /proc/843/cmdline pgrep File opened for reading /proc/1074/status pgrep File opened for reading /proc/15/cmdline pgrep File opened for reading /proc/408/status pgrep File opened for reading /proc/454/stat pidof File opened for reading /proc/1271/stat pidof File opened for reading /proc/11/cmdline pgrep File opened for reading /proc/73/status pgrep File opened for reading /proc/1283/cmdline pidof File opened for reading /proc/408/cmdline pgrep File opened for reading /proc/1131/status pgrep File opened for reading /proc/660/cmdline pidof File opened for reading /proc/839/cmdline pidof File opened for reading /proc/1091/cmdline pidof File opened for reading /proc/1193/cmdline pidof File opened for reading /proc/74/status pgrep File opened for reading /proc/93/status pgrep File opened for reading /proc/1156/status pgrep File opened for reading /proc/967/cmdline pidof File opened for reading /proc/1091/stat pidof File opened for reading /proc/198/status pgrep File opened for reading /proc/740/status pgrep File opened for reading /proc/1343/status pgrep File opened for reading /proc/979/status pgrep File opened for reading /proc/212/status pgrep File opened for reading /proc/1061/cmdline pidof File opened for reading /proc/206/status pgrep File opened for reading /proc/263/status pgrep File opened for reading /proc/1156/cmdline pgrep File opened for reading /proc/78/stat pidof File opened for reading /proc/94/cmdline pidof File opened for reading /proc/773/cmdline pidof File opened for reading /proc/1231/cmdline pidof File opened for reading /proc/102/cmdline pgrep File opened for reading /proc/81/status pgrep File opened for reading /proc/1210/cmdline pgrep File opened for reading /proc/77/cmdline pidof File opened for reading /proc/1053/stat pidof File opened for reading /proc/797/cmdline pgrep File opened for reading /proc/227/status pgrep File opened for reading /proc/1114/cmdline pgrep File opened for reading /proc/749/cmdline pgrep File opened for reading /proc/1213/stat pidof File opened for reading /proc/23/status pgrep File opened for reading /proc/314/cmdline pgrep File opened for reading /proc/1177/cmdline pgrep File opened for reading /proc/1447/cmdline pgrep File opened for reading /proc/221/cmdline pidof File opened for reading /proc/1317/stat pidof File opened for reading /proc/789/status pgrep File opened for reading /proc/74/cmdline pgrep File opened for reading /proc/83/cmdline pgrep File opened for reading /proc/609/stat pidof File opened for reading /proc/11/cmdline pidof File opened for reading /proc/11/status pgrep File opened for reading /proc/1176/status pgrep File opened for reading /proc/93/status pgrep File opened for reading /proc/2/cmdline pidof File opened for reading /proc/4/cmdline pidof File opened for reading /proc/506/cmdline pidof File opened for reading /proc/1343/status pgrep File opened for reading /proc/1532/cmdline pidof File opened for reading /proc/227/cmdline pidof
Processes
-
/tmp/14232438205da881ecb6dd38c74699e15ba9ba59ed208b2980f3f1b8558265f4.elf/tmp/14232438205da881ecb6dd38c74699e15ba9ba59ed208b2980f3f1b8558265f4.elf1⤵
- Deletes itself
- Modifies hosts file
- Modifies systemd
- Write file to user bin folder
PID:1565 -
/bin/shsh -c "pgrep 14232438205da881ecb6dd38c74699e15ba9ba59ed208b2980f3f1b8558265f4.elf"2⤵PID:1568
-
/usr/bin/pgreppgrep 14232438205da881ecb6dd38c74699e15ba9ba59ed208b2980f3f1b8558265f4.elf3⤵
- Reads CPU attributes
- Reads runtime system information
PID:1569
-
-
-
/bin/shsh -c "pidof 14232438205da881ecb6dd38c74699e15ba9ba59ed208b2980f3f1b8558265f4.elf"2⤵PID:1581
-
/usr/bin/pidofpidof 14232438205da881ecb6dd38c74699e15ba9ba59ed208b2980f3f1b8558265f4.elf3⤵
- Reads runtime system information
PID:1582
-
-
-
/bin/shsh -c "pgrep uplugplay"2⤵PID:1585
-
/usr/bin/pgreppgrep uplugplay3⤵
- Reads CPU attributes
- Reads runtime system information
PID:1586
-
-
-
/bin/shsh -c "pidof uplugplay"2⤵PID:1589
-
/usr/bin/pidofpidof uplugplay3⤵
- Reads runtime system information
PID:1590
-
-
-
/bin/shsh -c "pgrep upnpsetup"2⤵PID:1593
-
/usr/bin/pgreppgrep upnpsetup3⤵
- Reads CPU attributes
- Reads runtime system information
PID:1594
-
-
-
/bin/shsh -c "pidof upnpsetup"2⤵PID:1597
-
/usr/bin/pidofpidof upnpsetup3⤵
- Reads runtime system information
PID:1598
-
-
-
/bin/shsh -c "systemctl daemon-reload"2⤵PID:1599
-
/usr/bin/systemctlsystemctl daemon-reload3⤵PID:1600
-
-
-
/bin/shsh -c "systemctl enable uplugplay.service"2⤵PID:1634
-
/usr/bin/systemctlsystemctl enable uplugplay.service3⤵PID:1635
-
-
-
/bin/shsh -c "systemctl start uplugplay.service"2⤵PID:1671
-
/usr/bin/systemctlsystemctl start uplugplay.service3⤵PID:1672
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1XDG Autostart Entries
1Create or Modify System Process
1Systemd Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145B
MD58ca62d1f47880bce036c2956c9b7b272
SHA13bcc3a5c4fcc5b0d08c4524a59f6b8e113b62060
SHA256c655d3d4e374fad38313ec4262207b2d7d68a870238f203ef3c33f85e66c8e32
SHA5124cd2d9d67151fa25e833707dee2442c4a5f752053fc2c36ec73c0e2b734c66ca69c63fceb47714d9add5b9fe2eee1e45be5199e2cae7c26173e766b333877da6
-
Filesize
418KB
MD56e4fd7ad98aa58ae7f9bea135cd0a166
SHA19a825cc994e2e6b4d79b43a1c8bb5ea6a07b3eea
SHA25614232438205da881ecb6dd38c74699e15ba9ba59ed208b2980f3f1b8558265f4
SHA5125f0b113d6d560792fe1223ca867a147df7c889798ff5ac8e6bbbc8772b9803998863c764d3682381120baf1daa7308505dad77ead713da65a965af9661f52555