Analysis
-
max time kernel
6s -
max time network
137s -
platform
ubuntu-20.04_amd64 -
resource
ubuntu2004-amd64-20240729-en -
resource tags
arch:amd64arch:i386image:ubuntu2004-amd64-20240729-enkernel:5.4.0-169-genericlocale:en-usos:ubuntu-20.04-amd64system -
submitted
22/02/2025, 02:52
Behavioral task
behavioral1
Sample
289238096d8d59f01d7971355e2bccd759bd05759b9ce84c55be38c02e9c97da.elf
Resource
ubuntu2004-amd64-20240729-en
General
-
Target
289238096d8d59f01d7971355e2bccd759bd05759b9ce84c55be38c02e9c97da.elf
-
Size
418KB
-
MD5
ed6a2efe9bb6c75b66ab82e9d4a65f3a
-
SHA1
6e9cef0deb9d63407016574e79652c2486f3a1ae
-
SHA256
289238096d8d59f01d7971355e2bccd759bd05759b9ce84c55be38c02e9c97da
-
SHA512
dc6ac7fc522a8036b63b49adf8ac65a905784a2062eaeb84fd5374d5ecefa377fba0ee80f8f32fa3ff19aa7bcbc1e1cb403a6bc42d6d8390f0f8d6e8d83966f5
-
SSDEEP
12288:6QIkwT+V+46MTuxN+qpMBUH5kAAxwWVtBeSr:W4/y+qaBUZJAdVt/
Malware Config
Signatures
-
Prometei
Prometei is a multiplatform botnet used to mine cryptocurrency.
-
Prometei_elf family
-
Deletes itself 1 IoCs
pid Process 1405 289238096d8d59f01d7971355e2bccd759bd05759b9ce84c55be38c02e9c97da.elf -
Modifies hosts file 1 IoCs
Adds to hosts file used for mapping hosts to IP addresses.
description ioc Process File opened for modification /etc/hosts 289238096d8d59f01d7971355e2bccd759bd05759b9ce84c55be38c02e9c97da.elf -
Reads EFI boot settings 1 TTPs 3 IoCs
Reads EFI boot settings from the efivars filesystem, may contain security secrets or sensitive data.
description ioc Process File opened for reading /sys/firmware/efi/efivars/SystemdOptions-8cf2644b-4b0b-428f-9387-6d876050dc67 systemctl File opened for reading /sys/firmware/efi/efivars/SystemdOptions-8cf2644b-4b0b-428f-9387-6d876050dc67 systemctl File opened for reading /sys/firmware/efi/efivars/SystemdOptions-8cf2644b-4b0b-428f-9387-6d876050dc67 systemctl -
Enumerates running processes
Discovers information about currently running processes on the system
-
Modifies systemd 2 TTPs 1 IoCs
Adds/ modifies systemd service files. Likely to achieve persistence.
description ioc Process File opened for modification /lib/systemd/system/uplugplay.service 289238096d8d59f01d7971355e2bccd759bd05759b9ce84c55be38c02e9c97da.elf -
Write file to user bin folder 1 IoCs
description ioc Process File opened for modification /usr/sbin/uplugplay 289238096d8d59f01d7971355e2bccd759bd05759b9ce84c55be38c02e9c97da.elf -
resource yara_rule behavioral1/files/fstream-1.dat upx -
Reads CPU attributes 1 TTPs 3 IoCs
description ioc Process File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep -
description ioc Process File opened for reading /proc/1001/cmdline pidof File opened for reading /proc/1402/status pgrep File opened for reading /proc/588/cmdline pgrep File opened for reading /proc/1210/cmdline pgrep File opened for reading /proc/1/stat pidof File opened for reading /proc/13/status pgrep File opened for reading /proc/8/cmdline pgrep File opened for reading /proc/803/cmdline pidof File opened for reading /proc/5/cmdline pgrep File opened for reading /proc/73/stat pidof File opened for reading /proc/161/cmdline pidof File opened for reading /proc/998/cmdline pgrep File opened for reading /proc/201/cmdline pgrep File opened for reading /proc/1351/status pgrep File opened for reading /proc/515/stat pidof File opened for reading /proc/89/cmdline pgrep File opened for reading /proc/489/cmdline pidof File opened for reading /proc/1349/cmdline pidof File opened for reading /proc/584/status pgrep File opened for reading /proc/201/cmdline pidof File opened for reading /proc/481/cmdline pidof File opened for reading /proc/1122/cmdline pidof File opened for reading /proc/1097/status pgrep File opened for reading /proc/1091/stat pidof File opened for reading /proc/1404/status pgrep File opened for reading /proc/607/cmdline pidof File opened for reading /proc/1343/cmdline pidof File opened for reading /proc/967/stat pidof File opened for reading /proc/16/cmdline pgrep File opened for reading /proc/82/status pgrep File opened for reading /proc/1350/cmdline pgrep File opened for reading /proc/1355/cmdline pgrep File opened for reading /proc/1328/cmdline pgrep File opened for reading /proc/1404/cmdline pidof File opened for reading /proc/809/stat pidof File opened for reading /proc/163/stat pidof File opened for reading /proc/496/cmdline pgrep File opened for reading /proc/694/status pgrep File opened for reading /proc/1091/cmdline pidof File opened for reading /proc/79/cmdline pgrep File opened for reading /proc/81/stat pidof File opened for reading /proc/79/status pgrep File opened for reading /proc/163/cmdline pgrep File opened for reading /proc/75/stat pidof File opened for reading /proc/933/cmdline pidof File opened for reading /proc/1091/cmdline pgrep File opened for reading /proc/18/stat pidof File opened for reading /proc/170/cmdline pgrep File opened for reading /proc/1/cmdline pgrep File opened for reading /proc/484/stat pidof File opened for reading /proc/1403/cmdline pidof File opened for reading /proc/21/cmdline pidof File opened for reading /proc/173/cmdline pidof File opened for reading /proc/1001/stat pidof File opened for reading /proc/15/stat pidof File opened for reading /proc/16/cmdline pidof File opened for reading /proc/87/cmdline pidof File opened for reading /proc/1377/status pgrep File opened for reading /proc/1358/stat pidof File opened for reading /proc/1186/cmdline pgrep File opened for reading /proc/779/status pgrep File opened for reading /proc/1074/status pgrep File opened for reading /proc/455/stat pidof File opened for reading /proc/784/stat pidof
Processes
-
/tmp/289238096d8d59f01d7971355e2bccd759bd05759b9ce84c55be38c02e9c97da.elf/tmp/289238096d8d59f01d7971355e2bccd759bd05759b9ce84c55be38c02e9c97da.elf1⤵
- Deletes itself
- Modifies hosts file
- Modifies systemd
- Write file to user bin folder
PID:1405 -
/bin/shsh -c "pgrep 289238096d8d59f01d7971355e2bccd759bd05759b9ce84c55be38c02e9c97da.elf"2⤵PID:1408
-
/usr/bin/pgreppgrep 289238096d8d59f01d7971355e2bccd759bd05759b9ce84c55be38c02e9c97da.elf3⤵
- Reads CPU attributes
- Reads runtime system information
PID:1409
-
-
-
/bin/shsh -c "pidof 289238096d8d59f01d7971355e2bccd759bd05759b9ce84c55be38c02e9c97da.elf"2⤵PID:1451
-
/usr/bin/pidofpidof 289238096d8d59f01d7971355e2bccd759bd05759b9ce84c55be38c02e9c97da.elf3⤵
- Reads runtime system information
PID:1452
-
-
-
/bin/shsh -c "pgrep uplugplay"2⤵PID:1455
-
/usr/bin/pgreppgrep uplugplay3⤵
- Reads CPU attributes
- Reads runtime system information
PID:1456
-
-
-
/bin/shsh -c "pidof uplugplay"2⤵PID:1459
-
/usr/bin/pidofpidof uplugplay3⤵
- Reads runtime system information
PID:1460
-
-
-
/bin/shsh -c "pgrep upnpsetup"2⤵PID:1463
-
/usr/bin/pgreppgrep upnpsetup3⤵
- Reads CPU attributes
- Reads runtime system information
PID:1464
-
-
-
/bin/shsh -c "pidof upnpsetup"2⤵PID:1467
-
/usr/bin/pidofpidof upnpsetup3⤵
- Reads runtime system information
PID:1468
-
-
-
/bin/shsh -c "systemctl daemon-reload"2⤵PID:1470
-
/usr/bin/systemctlsystemctl daemon-reload3⤵
- Reads EFI boot settings
PID:1471
-
-
-
/bin/shsh -c "systemctl enable uplugplay.service"2⤵PID:1497
-
/usr/bin/systemctlsystemctl enable uplugplay.service3⤵
- Reads EFI boot settings
PID:1498
-
-
-
/bin/shsh -c "systemctl start uplugplay.service"2⤵PID:1540
-
/usr/bin/systemctlsystemctl start uplugplay.service3⤵
- Reads EFI boot settings
PID:1541
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1XDG Autostart Entries
1Create or Modify System Process
1Systemd Service
1Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145B
MD58ca62d1f47880bce036c2956c9b7b272
SHA13bcc3a5c4fcc5b0d08c4524a59f6b8e113b62060
SHA256c655d3d4e374fad38313ec4262207b2d7d68a870238f203ef3c33f85e66c8e32
SHA5124cd2d9d67151fa25e833707dee2442c4a5f752053fc2c36ec73c0e2b734c66ca69c63fceb47714d9add5b9fe2eee1e45be5199e2cae7c26173e766b333877da6
-
Filesize
418KB
MD5ed6a2efe9bb6c75b66ab82e9d4a65f3a
SHA16e9cef0deb9d63407016574e79652c2486f3a1ae
SHA256289238096d8d59f01d7971355e2bccd759bd05759b9ce84c55be38c02e9c97da
SHA512dc6ac7fc522a8036b63b49adf8ac65a905784a2062eaeb84fd5374d5ecefa377fba0ee80f8f32fa3ff19aa7bcbc1e1cb403a6bc42d6d8390f0f8d6e8d83966f5