Malware Analysis Report

2025-06-16 02:03

Sample ID 250222-c3735ayjv3
Target 14232438205da881ecb6dd38c74699e15ba9ba59ed208b2980f3f1b8558265f4.elf
SHA256 14232438205da881ecb6dd38c74699e15ba9ba59ed208b2980f3f1b8558265f4
Tags
upx prometei_elf botnet discovery miner persistence privilege_escalation
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

14232438205da881ecb6dd38c74699e15ba9ba59ed208b2980f3f1b8558265f4

Threat Level: Known bad

The file 14232438205da881ecb6dd38c74699e15ba9ba59ed208b2980f3f1b8558265f4.elf was found to be: Known bad.

Malicious Activity Summary

upx prometei_elf botnet discovery miner persistence privilege_escalation

Prometei

Prometei_elf family

Modifies hosts file

Deletes itself

Write file to user bin folder

Enumerates running processes

Modifies systemd

UPX packed file

Reads CPU attributes

Reads runtime system information

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2025-02-22 02:37

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2025-02-22 02:37

Reported

2025-02-22 02:39

Platform

ubuntu2204-amd64-20240611-en

Max time kernel

6s

Max time network

128s

Command Line

[/tmp/14232438205da881ecb6dd38c74699e15ba9ba59ed208b2980f3f1b8558265f4.elf]

Signatures

Prometei

botnet miner prometei_elf

Prometei_elf family

prometei_elf

Deletes itself

Description Indicator Process Target
N/A N/A /tmp/14232438205da881ecb6dd38c74699e15ba9ba59ed208b2980f3f1b8558265f4.elf N/A

Modifies hosts file

Description Indicator Process Target
File opened for modification /etc/hosts /tmp/14232438205da881ecb6dd38c74699e15ba9ba59ed208b2980f3f1b8558265f4.elf N/A

Enumerates running processes

Modifies systemd

persistence privilege_escalation
Description Indicator Process Target
File opened for modification /lib/systemd/system/uplugplay.service /tmp/14232438205da881ecb6dd38c74699e15ba9ba59ed208b2980f3f1b8558265f4.elf N/A

Write file to user bin folder

persistence
Description Indicator Process Target
File opened for modification /usr/sbin/uplugplay /tmp/14232438205da881ecb6dd38c74699e15ba9ba59ed208b2980f3f1b8558265f4.elf N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Reads CPU attributes

discovery
Description Indicator Process Target
File opened for reading /sys/devices/system/cpu/online /usr/bin/pgrep N/A
File opened for reading /sys/devices/system/cpu/online /usr/bin/pgrep N/A
File opened for reading /sys/devices/system/cpu/online /usr/bin/pgrep N/A

Reads runtime system information

discovery
Description Indicator Process Target
File opened for reading /proc/86/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/843/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/1074/status /usr/bin/pgrep N/A
File opened for reading /proc/15/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/408/status /usr/bin/pgrep N/A
File opened for reading /proc/454/stat /usr/bin/pidof N/A
File opened for reading /proc/1271/stat /usr/bin/pidof N/A
File opened for reading /proc/11/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/73/status /usr/bin/pgrep N/A
File opened for reading /proc/1283/cmdline /usr/bin/pidof N/A
File opened for reading /proc/408/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/1131/status /usr/bin/pgrep N/A
File opened for reading /proc/660/cmdline /usr/bin/pidof N/A
File opened for reading /proc/839/cmdline /usr/bin/pidof N/A
File opened for reading /proc/1091/cmdline /usr/bin/pidof N/A
File opened for reading /proc/1193/cmdline /usr/bin/pidof N/A
File opened for reading /proc/74/status /usr/bin/pgrep N/A
File opened for reading /proc/93/status /usr/bin/pgrep N/A
File opened for reading /proc/1156/status /usr/bin/pgrep N/A
File opened for reading /proc/967/cmdline /usr/bin/pidof N/A
File opened for reading /proc/1091/stat /usr/bin/pidof N/A
File opened for reading /proc/198/status /usr/bin/pgrep N/A
File opened for reading /proc/740/status /usr/bin/pgrep N/A
File opened for reading /proc/1343/status /usr/bin/pgrep N/A
File opened for reading /proc/979/status /usr/bin/pgrep N/A
File opened for reading /proc/212/status /usr/bin/pgrep N/A
File opened for reading /proc/1061/cmdline /usr/bin/pidof N/A
File opened for reading /proc/206/status /usr/bin/pgrep N/A
File opened for reading /proc/263/status /usr/bin/pgrep N/A
File opened for reading /proc/1156/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/78/stat /usr/bin/pidof N/A
File opened for reading /proc/94/cmdline /usr/bin/pidof N/A
File opened for reading /proc/773/cmdline /usr/bin/pidof N/A
File opened for reading /proc/1231/cmdline /usr/bin/pidof N/A
File opened for reading /proc/102/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/81/status /usr/bin/pgrep N/A
File opened for reading /proc/1210/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/77/cmdline /usr/bin/pidof N/A
File opened for reading /proc/1053/stat /usr/bin/pidof N/A
File opened for reading /proc/797/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/227/status /usr/bin/pgrep N/A
File opened for reading /proc/1114/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/749/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/1213/stat /usr/bin/pidof N/A
File opened for reading /proc/23/status /usr/bin/pgrep N/A
File opened for reading /proc/314/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/1177/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/1447/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/221/cmdline /usr/bin/pidof N/A
File opened for reading /proc/1317/stat /usr/bin/pidof N/A
File opened for reading /proc/789/status /usr/bin/pgrep N/A
File opened for reading /proc/74/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/83/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/609/stat /usr/bin/pidof N/A
File opened for reading /proc/11/cmdline /usr/bin/pidof N/A
File opened for reading /proc/11/status /usr/bin/pgrep N/A
File opened for reading /proc/1176/status /usr/bin/pgrep N/A
File opened for reading /proc/93/status /usr/bin/pgrep N/A
File opened for reading /proc/2/cmdline /usr/bin/pidof N/A
File opened for reading /proc/4/cmdline /usr/bin/pidof N/A
File opened for reading /proc/506/cmdline /usr/bin/pidof N/A
File opened for reading /proc/1343/status /usr/bin/pgrep N/A
File opened for reading /proc/1532/cmdline /usr/bin/pidof N/A
File opened for reading /proc/227/cmdline /usr/bin/pidof N/A

Processes

/tmp/14232438205da881ecb6dd38c74699e15ba9ba59ed208b2980f3f1b8558265f4.elf

[/tmp/14232438205da881ecb6dd38c74699e15ba9ba59ed208b2980f3f1b8558265f4.elf]

/bin/sh

[sh -c pgrep 14232438205da881ecb6dd38c74699e15ba9ba59ed208b2980f3f1b8558265f4.elf]

/usr/bin/pgrep

[pgrep 14232438205da881ecb6dd38c74699e15ba9ba59ed208b2980f3f1b8558265f4.elf]

/bin/sh

[sh -c pidof 14232438205da881ecb6dd38c74699e15ba9ba59ed208b2980f3f1b8558265f4.elf]

/usr/bin/pidof

[pidof 14232438205da881ecb6dd38c74699e15ba9ba59ed208b2980f3f1b8558265f4.elf]

/bin/sh

[sh -c pgrep uplugplay]

/usr/bin/pgrep

[pgrep uplugplay]

/bin/sh

[sh -c pidof uplugplay]

/usr/bin/pidof

[pidof uplugplay]

/bin/sh

[sh -c pgrep upnpsetup]

/usr/bin/pgrep

[pgrep upnpsetup]

/bin/sh

[sh -c pidof upnpsetup]

/usr/bin/pidof

[pidof upnpsetup]

/bin/sh

[sh -c systemctl daemon-reload]

/usr/bin/systemctl

[systemctl daemon-reload]

/bin/sh

[sh -c systemctl enable uplugplay.service]

/usr/bin/systemctl

[systemctl enable uplugplay.service]

/bin/sh

[sh -c systemctl start uplugplay.service]

/usr/bin/systemctl

[systemctl start uplugplay.service]

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 p3.feefreepool.net udp
DE 88.198.246.242:80 p3.feefreepool.net tcp

Files

memory/1565-1-0x0000000000400000-0x00000000015640f8-memory.dmp

/usr/sbin/uplugplay

MD5 6e4fd7ad98aa58ae7f9bea135cd0a166
SHA1 9a825cc994e2e6b4d79b43a1c8bb5ea6a07b3eea
SHA256 14232438205da881ecb6dd38c74699e15ba9ba59ed208b2980f3f1b8558265f4
SHA512 5f0b113d6d560792fe1223ca867a147df7c889798ff5ac8e6bbbc8772b9803998863c764d3682381120baf1daa7308505dad77ead713da65a965af9661f52555

/usr/lib/systemd/system/uplugplay.service

MD5 8ca62d1f47880bce036c2956c9b7b272
SHA1 3bcc3a5c4fcc5b0d08c4524a59f6b8e113b62060
SHA256 c655d3d4e374fad38313ec4262207b2d7d68a870238f203ef3c33f85e66c8e32
SHA512 4cd2d9d67151fa25e833707dee2442c4a5f752053fc2c36ec73c0e2b734c66ca69c63fceb47714d9add5b9fe2eee1e45be5199e2cae7c26173e766b333877da6