Malware Analysis Report

2025-06-16 02:03

Sample ID 250222-dzgmfaypx9
Target 4a88a4d1ff3359e9323a1f6d6cf9949fbd0e65153dbe162c85ef886c852f1734.elf
SHA256 4a88a4d1ff3359e9323a1f6d6cf9949fbd0e65153dbe162c85ef886c852f1734
Tags
upx prometei_elf botnet discovery miner persistence privilege_escalation
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

4a88a4d1ff3359e9323a1f6d6cf9949fbd0e65153dbe162c85ef886c852f1734

Threat Level: Known bad

The file 4a88a4d1ff3359e9323a1f6d6cf9949fbd0e65153dbe162c85ef886c852f1734.elf was found to be: Known bad.

Malicious Activity Summary

upx prometei_elf botnet discovery miner persistence privilege_escalation

Prometei

Prometei_elf family

Modifies hosts file

Deletes itself

Enumerates running processes

Modifies systemd

Write file to user bin folder

UPX packed file

Reads CPU attributes

Reads runtime system information

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2025-02-22 03:26

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2025-02-22 03:26

Reported

2025-02-22 03:29

Platform

ubuntu2204-amd64-20240611-en

Max time kernel

7s

Max time network

131s

Command Line

[/tmp/4a88a4d1ff3359e9323a1f6d6cf9949fbd0e65153dbe162c85ef886c852f1734.elf]

Signatures

Prometei

botnet miner prometei_elf

Prometei_elf family

prometei_elf

Deletes itself

Description Indicator Process Target
N/A N/A /tmp/4a88a4d1ff3359e9323a1f6d6cf9949fbd0e65153dbe162c85ef886c852f1734.elf N/A

Modifies hosts file

Description Indicator Process Target
File opened for modification /etc/hosts /tmp/4a88a4d1ff3359e9323a1f6d6cf9949fbd0e65153dbe162c85ef886c852f1734.elf N/A

Enumerates running processes

Modifies systemd

persistence privilege_escalation
Description Indicator Process Target
File opened for modification /lib/systemd/system/uplugplay.service /tmp/4a88a4d1ff3359e9323a1f6d6cf9949fbd0e65153dbe162c85ef886c852f1734.elf N/A

Write file to user bin folder

persistence
Description Indicator Process Target
File opened for modification /usr/sbin/uplugplay /tmp/4a88a4d1ff3359e9323a1f6d6cf9949fbd0e65153dbe162c85ef886c852f1734.elf N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Reads CPU attributes

discovery
Description Indicator Process Target
File opened for reading /sys/devices/system/cpu/online /usr/bin/pgrep N/A
File opened for reading /sys/devices/system/cpu/online /usr/bin/pgrep N/A
File opened for reading /sys/devices/system/cpu/online /usr/bin/pgrep N/A

Reads runtime system information

discovery
Description Indicator Process Target
File opened for reading /proc/1326/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/871/stat /usr/bin/pidof N/A
File opened for reading /proc/75/cmdline /usr/bin/pidof N/A
File opened for reading /proc/76/cmdline /usr/bin/pidof N/A
File opened for reading /proc/99/cmdline /usr/bin/pidof N/A
File opened for reading /proc/210/cmdline /usr/bin/pidof N/A
File opened for reading /proc/410/status /usr/bin/pgrep N/A
File opened for reading /proc/101/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/1299/status /usr/bin/pgrep N/A
File opened for reading /proc/635/cmdline /usr/bin/pidof N/A
File opened for reading /proc/308/status /usr/bin/pgrep N/A
File opened for reading /proc/1052/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/1075/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/583/cmdline /usr/bin/pidof N/A
File opened for reading /proc/737/stat /usr/bin/pidof N/A
File opened for reading /proc/1254/stat /usr/bin/pidof N/A
File opened for reading /proc/1143/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/1277/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/1398/cmdline /usr/bin/pidof N/A
File opened for reading /proc/222/cmdline /usr/bin/pidof N/A
File opened for reading /proc/1165/cmdline /usr/bin/pidof N/A
File opened for reading /proc/631/stat /usr/bin/pidof N/A
File opened for reading /proc/4/status /usr/bin/pgrep N/A
File opened for reading /proc/22/cmdline /usr/bin/pidof N/A
File opened for reading /proc/27/status /usr/bin/pgrep N/A
File opened for reading /proc/1302/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/118/status /usr/bin/pgrep N/A
File opened for reading /proc/756/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/12/cmdline /usr/bin/pidof N/A
File opened for reading /proc/91/stat /usr/bin/pidof N/A
File opened for reading /proc/757/status /usr/bin/pgrep N/A
File opened for reading /proc/1162/status /usr/bin/pgrep N/A
File opened for reading /proc/91/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/222/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/1408/stat /usr/bin/pidof N/A
File opened for reading /proc/223/status /usr/bin/pgrep N/A
File opened for reading /proc/1409/cmdline /usr/bin/pidof N/A
File opened for reading /proc/1479/cmdline /usr/bin/pidof N/A
File opened for reading /proc/26/stat /usr/bin/pidof N/A
File opened for reading /proc/1134/stat /usr/bin/pidof N/A
File opened for reading /proc/1014/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/7/stat /usr/bin/pidof N/A
File opened for reading /proc/209/cmdline /usr/bin/pidof N/A
File opened for reading /proc/404/stat /usr/bin/pidof N/A
File opened for reading /proc/1184/stat /usr/bin/pidof N/A
File opened for reading /proc/756/cmdline /usr/bin/pidof N/A
File opened for reading /proc/26/cmdline /usr/bin/pidof N/A
File opened for reading /proc/11/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/962/stat /usr/bin/pidof N/A
File opened for reading /proc/5/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/645/stat /usr/bin/pidof N/A
File opened for reading /proc/1040/cmdline /usr/bin/pidof N/A
File opened for reading /proc/18/stat /usr/bin/pidof N/A
File opened for reading /proc/1213/status /usr/bin/pgrep N/A
File opened for reading /proc/209/cmdline /usr/bin/pidof N/A
File opened for reading /proc/1254/stat /usr/bin/pidof N/A
File opened for reading /proc/1164/status /usr/bin/pgrep N/A
File opened for reading /proc/16/stat /usr/bin/pidof N/A
File opened for reading /proc/78/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/112/stat /usr/bin/pidof N/A
File opened for reading /proc/8/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/589/status /usr/bin/pgrep N/A
File opened for reading /proc/88/cmdline /usr/bin/pidof N/A
File opened for reading /proc/1127/stat /usr/bin/pidof N/A

Processes

/tmp/4a88a4d1ff3359e9323a1f6d6cf9949fbd0e65153dbe162c85ef886c852f1734.elf

[/tmp/4a88a4d1ff3359e9323a1f6d6cf9949fbd0e65153dbe162c85ef886c852f1734.elf]

/bin/sh

[sh -c pgrep 4a88a4d1ff3359e9323a1f6d6cf9949fbd0e65153dbe162c85ef886c852f1734.elf]

/usr/bin/pgrep

[pgrep 4a88a4d1ff3359e9323a1f6d6cf9949fbd0e65153dbe162c85ef886c852f1734.elf]

/bin/sh

[sh -c pidof 4a88a4d1ff3359e9323a1f6d6cf9949fbd0e65153dbe162c85ef886c852f1734.elf]

/usr/bin/pidof

[pidof 4a88a4d1ff3359e9323a1f6d6cf9949fbd0e65153dbe162c85ef886c852f1734.elf]

/bin/sh

[sh -c pgrep uplugplay]

/usr/bin/pgrep

[pgrep uplugplay]

/bin/sh

[sh -c pidof uplugplay]

/usr/bin/pidof

[pidof uplugplay]

/bin/sh

[sh -c pgrep upnpsetup]

/usr/bin/pgrep

[pgrep upnpsetup]

/bin/sh

[sh -c pidof upnpsetup]

/usr/bin/pidof

[pidof upnpsetup]

/bin/sh

[sh -c systemctl daemon-reload]

/usr/bin/systemctl

[systemctl daemon-reload]

/bin/sh

[sh -c systemctl enable uplugplay.service]

/usr/bin/systemctl

[systemctl enable uplugplay.service]

/bin/sh

[sh -c systemctl start uplugplay.service]

/usr/bin/systemctl

[systemctl start uplugplay.service]

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 p3.feefreepool.net udp

Files

memory/1592-1-0x0000000000400000-0x00000000015640f8-memory.dmp

/usr/sbin/uplugplay

MD5 148e8f56cacba9a4dbfca6b984af1f46
SHA1 7b4d74f30bb49b1391bdb33d511682aaacaf7af9
SHA256 4a88a4d1ff3359e9323a1f6d6cf9949fbd0e65153dbe162c85ef886c852f1734
SHA512 58d4c41f23eebbfcb0733f9a0edcc51533774d86496db4cb8a4d8045554e40428611fb0e4c6396f00f5627beaf5a6ee43b89b5129d85c919f4e7990ac7777205

/usr/lib/systemd/system/uplugplay.service

MD5 8ca62d1f47880bce036c2956c9b7b272
SHA1 3bcc3a5c4fcc5b0d08c4524a59f6b8e113b62060
SHA256 c655d3d4e374fad38313ec4262207b2d7d68a870238f203ef3c33f85e66c8e32
SHA512 4cd2d9d67151fa25e833707dee2442c4a5f752053fc2c36ec73c0e2b734c66ca69c63fceb47714d9add5b9fe2eee1e45be5199e2cae7c26173e766b333877da6