Malware Analysis Report

2025-06-16 02:03

Sample ID 250222-dwhqbswphw
Target 447066ebca99e2042d8f39faf1667ccb71b1415f65c4a6a1e29ec94ee93df994.elf
SHA256 447066ebca99e2042d8f39faf1667ccb71b1415f65c4a6a1e29ec94ee93df994
Tags
upx prometei_elf botnet discovery miner persistence privilege_escalation
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

447066ebca99e2042d8f39faf1667ccb71b1415f65c4a6a1e29ec94ee93df994

Threat Level: Known bad

The file 447066ebca99e2042d8f39faf1667ccb71b1415f65c4a6a1e29ec94ee93df994.elf was found to be: Known bad.

Malicious Activity Summary

upx prometei_elf botnet discovery miner persistence privilege_escalation

Prometei

Prometei_elf family

Deletes itself

Modifies hosts file

Enumerates running processes

Modifies systemd

Write file to user bin folder

UPX packed file

Reads CPU attributes

Reads runtime system information

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2025-02-22 03:21

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2025-02-22 03:21

Reported

2025-02-22 03:23

Platform

ubuntu2204-amd64-20240729-en

Max time kernel

6s

Max time network

128s

Command Line

[/tmp/447066ebca99e2042d8f39faf1667ccb71b1415f65c4a6a1e29ec94ee93df994.elf]

Signatures

Prometei

botnet miner prometei_elf

Prometei_elf family

prometei_elf

Deletes itself

Description Indicator Process Target
N/A N/A /tmp/447066ebca99e2042d8f39faf1667ccb71b1415f65c4a6a1e29ec94ee93df994.elf N/A

Modifies hosts file

Description Indicator Process Target
File opened for modification /etc/hosts /tmp/447066ebca99e2042d8f39faf1667ccb71b1415f65c4a6a1e29ec94ee93df994.elf N/A

Enumerates running processes

Modifies systemd

persistence privilege_escalation
Description Indicator Process Target
File opened for modification /lib/systemd/system/uplugplay.service /tmp/447066ebca99e2042d8f39faf1667ccb71b1415f65c4a6a1e29ec94ee93df994.elf N/A

Write file to user bin folder

persistence
Description Indicator Process Target
File opened for modification /usr/sbin/uplugplay /tmp/447066ebca99e2042d8f39faf1667ccb71b1415f65c4a6a1e29ec94ee93df994.elf N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Reads CPU attributes

discovery
Description Indicator Process Target
File opened for reading /sys/devices/system/cpu/online /usr/bin/pgrep N/A
File opened for reading /sys/devices/system/cpu/online /usr/bin/pgrep N/A
File opened for reading /sys/devices/system/cpu/online /usr/bin/pgrep N/A

Reads runtime system information

discovery
Description Indicator Process Target
File opened for reading /proc/638/stat /usr/bin/pidof N/A
File opened for reading /proc/497/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/1213/status /usr/bin/pgrep N/A
File opened for reading /proc/722/stat /usr/bin/pidof N/A
File opened for reading /proc/1380/cmdline /usr/bin/pidof N/A
File opened for reading /proc/411/status /usr/bin/pgrep N/A
File opened for reading /proc/667/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/1156/stat /usr/bin/pidof N/A
File opened for reading /proc/15/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/1077/cmdline /usr/bin/pidof N/A
File opened for reading /proc/1243/stat /usr/bin/pidof N/A
File opened for reading /proc/415/cmdline /usr/bin/pidof N/A
File opened for reading /proc/1170/status /usr/bin/pgrep N/A
File opened for reading /proc/225/cmdline /usr/bin/pidof N/A
File opened for reading /proc/452/stat /usr/bin/pidof N/A
File opened for reading /proc/202/stat /usr/bin/pidof N/A
File opened for reading /proc/218/stat /usr/bin/pidof N/A
File opened for reading /proc/1446/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/102/stat /usr/bin/pidof N/A
File opened for reading /proc/804/stat /usr/bin/pidof N/A
File opened for reading /proc/98/status /usr/bin/pgrep N/A
File opened for reading /proc/208/status /usr/bin/pgrep N/A
File opened for reading /proc/520/status /usr/bin/pgrep N/A
File opened for reading /proc/11/stat /usr/bin/pidof N/A
File opened for reading /proc/1032/cmdline /usr/bin/pidof N/A
File opened for reading /proc/119/status /usr/bin/pgrep N/A
File opened for reading /proc/1364/stat /usr/bin/pidof N/A
File opened for reading /proc/210/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/4/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/22/stat /usr/bin/pidof N/A
File opened for reading /proc/163/stat /usr/bin/pidof N/A
File opened for reading /proc/2/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/95/stat /usr/bin/pidof N/A
File opened for reading /proc/75/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/416/stat /usr/bin/pidof N/A
File opened for reading /proc/1196/cmdline /usr/bin/pidof N/A
File opened for reading /proc/788/stat /usr/bin/pidof N/A
File opened for reading /proc/1213/stat /usr/bin/pidof N/A
File opened for reading /proc/97/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/96/cmdline /usr/bin/pidof N/A
File opened for reading /proc/20/status /usr/bin/pgrep N/A
File opened for reading /proc/216/stat /usr/bin/pidof N/A
File opened for reading /proc/1073/stat /usr/bin/pidof N/A
File opened for reading /proc/1107/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/1139/stat /usr/bin/pidof N/A
File opened for reading /proc/774/cmdline /usr/bin/pidof N/A
File opened for reading /proc/90/stat /usr/bin/pidof N/A
File opened for reading /proc/110/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/27/status /usr/bin/pgrep N/A
File opened for reading /proc/1032/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/639/stat /usr/bin/pidof N/A
File opened for reading /proc/749/stat /usr/bin/pidof N/A
File opened for reading /proc/1073/stat /usr/bin/pidof N/A
File opened for reading /proc/1300/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/3/cmdline /usr/bin/pidof N/A
File opened for reading /proc/25/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/588/status /usr/bin/pgrep N/A
File opened for reading /proc/1562/status /usr/bin/pgrep N/A
File opened for reading /proc/216/status /usr/bin/pgrep N/A
File opened for reading /proc/639/status /usr/bin/pgrep N/A
File opened for reading /proc/1561/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/638/cmdline /usr/bin/pidof N/A
File opened for reading /proc/114/status /usr/bin/pgrep N/A
File opened for reading /proc/634/cmdline /usr/bin/pidof N/A

Processes

/tmp/447066ebca99e2042d8f39faf1667ccb71b1415f65c4a6a1e29ec94ee93df994.elf

[/tmp/447066ebca99e2042d8f39faf1667ccb71b1415f65c4a6a1e29ec94ee93df994.elf]

/bin/sh

[sh -c pgrep 447066ebca99e2042d8f39faf1667ccb71b1415f65c4a6a1e29ec94ee93df994.elf]

/usr/bin/pgrep

[pgrep 447066ebca99e2042d8f39faf1667ccb71b1415f65c4a6a1e29ec94ee93df994.elf]

/bin/sh

[sh -c pidof 447066ebca99e2042d8f39faf1667ccb71b1415f65c4a6a1e29ec94ee93df994.elf]

/usr/bin/pidof

[pidof 447066ebca99e2042d8f39faf1667ccb71b1415f65c4a6a1e29ec94ee93df994.elf]

/bin/sh

[sh -c pgrep uplugplay]

/usr/bin/pgrep

[pgrep uplugplay]

/bin/sh

[sh -c pidof uplugplay]

/usr/bin/pidof

[pidof uplugplay]

/bin/sh

[sh -c pgrep upnpsetup]

/usr/bin/pgrep

[pgrep upnpsetup]

/bin/sh

[sh -c pidof upnpsetup]

/usr/bin/pidof

[pidof upnpsetup]

/bin/sh

[sh -c systemctl daemon-reload]

/usr/bin/systemctl

[systemctl daemon-reload]

/bin/sh

[sh -c systemctl enable uplugplay.service]

/usr/bin/systemctl

[systemctl enable uplugplay.service]

/bin/sh

[sh -c systemctl start uplugplay.service]

/usr/bin/systemctl

[systemctl start uplugplay.service]

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 p3.feefreepool.net udp
DE 88.198.246.242:80 p3.feefreepool.net tcp

Files

memory/1563-1-0x0000000000400000-0x00000000015640f8-memory.dmp

/usr/sbin/uplugplay

MD5 693b580965363240fc98cd1ac1748b9c
SHA1 d4fe39fdc15396f8e6f63fca823a2a286577329d
SHA256 447066ebca99e2042d8f39faf1667ccb71b1415f65c4a6a1e29ec94ee93df994
SHA512 38651168ea32529ae59ebcf27ca11bec01da7763c3496dace084c08065c676e10eb2c1e0d76bbbddc8223cd2b569b1602a62fa86e0b08953cbb4d7cf89896b24

/usr/lib/systemd/system/uplugplay.service

MD5 8ca62d1f47880bce036c2956c9b7b272
SHA1 3bcc3a5c4fcc5b0d08c4524a59f6b8e113b62060
SHA256 c655d3d4e374fad38313ec4262207b2d7d68a870238f203ef3c33f85e66c8e32
SHA512 4cd2d9d67151fa25e833707dee2442c4a5f752053fc2c36ec73c0e2b734c66ca69c63fceb47714d9add5b9fe2eee1e45be5199e2cae7c26173e766b333877da6