Analysis
-
max time kernel
6s -
max time network
142s -
platform
ubuntu-20.04_amd64 -
resource
ubuntu2004-amd64-20240508-en -
resource tags
arch:amd64arch:i386image:ubuntu2004-amd64-20240508-enkernel:5.4.0-169-genericlocale:en-usos:ubuntu-20.04-amd64system -
submitted
22/02/2025, 03:57
Behavioral task
behavioral1
Sample
600f201eae40de7a598b2d08b190d07f07a3988b889200f5d36d30619fa7e478.elf
Resource
ubuntu2004-amd64-20240508-en
General
-
Target
600f201eae40de7a598b2d08b190d07f07a3988b889200f5d36d30619fa7e478.elf
-
Size
418KB
-
MD5
71500ca140a274e2e1c190e0eba34aee
-
SHA1
e8e80b358732eb978536e0f1a77baf69a8746d99
-
SHA256
600f201eae40de7a598b2d08b190d07f07a3988b889200f5d36d30619fa7e478
-
SHA512
448a434e8df285a328971fdb1b1b4dd2ca46029de8099eaa8e468ce0ce20328e90af4012f77d8fec8d6b7fd12af65f58877d075bc5684c68abf60619b6770105
-
SSDEEP
12288:6QIkwT+V+46MTuxN+qpMBUH5kAAxwWVtBeSL:W4/y+qaBUZJAdVtX
Malware Config
Signatures
-
Prometei
Prometei is a multiplatform botnet used to mine cryptocurrency.
-
Prometei_elf family
-
Deletes itself 1 IoCs
pid Process 1401 600f201eae40de7a598b2d08b190d07f07a3988b889200f5d36d30619fa7e478.elf -
Modifies hosts file 1 IoCs
Adds to hosts file used for mapping hosts to IP addresses.
description ioc Process File opened for modification /etc/hosts 600f201eae40de7a598b2d08b190d07f07a3988b889200f5d36d30619fa7e478.elf -
Reads EFI boot settings 1 TTPs 3 IoCs
Reads EFI boot settings from the efivars filesystem, may contain security secrets or sensitive data.
description ioc Process File opened for reading /sys/firmware/efi/efivars/SystemdOptions-8cf2644b-4b0b-428f-9387-6d876050dc67 systemctl File opened for reading /sys/firmware/efi/efivars/SystemdOptions-8cf2644b-4b0b-428f-9387-6d876050dc67 systemctl File opened for reading /sys/firmware/efi/efivars/SystemdOptions-8cf2644b-4b0b-428f-9387-6d876050dc67 systemctl -
Enumerates running processes
Discovers information about currently running processes on the system
-
Modifies systemd 2 TTPs 1 IoCs
Adds/ modifies systemd service files. Likely to achieve persistence.
description ioc Process File opened for modification /lib/systemd/system/uplugplay.service 600f201eae40de7a598b2d08b190d07f07a3988b889200f5d36d30619fa7e478.elf -
Write file to user bin folder 1 IoCs
description ioc Process File opened for modification /usr/sbin/uplugplay 600f201eae40de7a598b2d08b190d07f07a3988b889200f5d36d30619fa7e478.elf -
resource yara_rule behavioral1/files/fstream-1.dat upx -
Reads CPU attributes 1 TTPs 3 IoCs
description ioc Process File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep -
description ioc Process File opened for reading /proc/1399/cmdline pidof File opened for reading /proc/783/cmdline pidof File opened for reading /proc/19/cmdline pgrep File opened for reading /proc/1132/cmdline pgrep File opened for reading /proc/18/cmdline pidof File opened for reading /proc/173/stat pidof File opened for reading /proc/639/stat pidof File opened for reading /proc/948/status pgrep File opened for reading /proc/1452/cmdline pgrep File opened for reading /proc/953/stat pidof File opened for reading /proc/560/status pgrep File opened for reading /proc/84/cmdline pidof File opened for reading /proc/1218/status pgrep File opened for reading /proc/23/stat pidof File opened for reading /proc/832/cmdline pidof File opened for reading /proc/1078/cmdline pgrep File opened for reading /proc/24/cmdline pgrep File opened for reading /proc/105/status pgrep File opened for reading /proc/539/stat pidof File opened for reading /proc/948/stat pidof File opened for reading /proc/923/stat pidof File opened for reading /proc/778/stat pidof File opened for reading /proc/1032/cmdline pidof File opened for reading /proc/1352/stat pidof File opened for reading /proc/959/cmdline pgrep File opened for reading /proc/1086/status pgrep File opened for reading /proc/2/cmdline pidof File opened for reading /proc/995/cmdline pgrep File opened for reading /proc/1346/cmdline pgrep File opened for reading /proc/9/cmdline pidof File opened for reading /proc/93/stat pidof File opened for reading /proc/667/stat pidof File opened for reading /proc/20/status pgrep File opened for reading /proc/81/status pgrep File opened for reading /proc/1063/cmdline pgrep File opened for reading /proc/89/stat pidof File opened for reading /proc/441/cmdline pidof File opened for reading /proc/919/cmdline pgrep File opened for reading /proc/filesystems systemctl File opened for reading /proc/178/cmdline pgrep File opened for reading /proc/1081/cmdline pgrep File opened for reading /proc/22/cmdline pidof File opened for reading /proc/1339/cmdline pgrep File opened for reading /proc/897/stat pidof File opened for reading /proc/808/cmdline pgrep File opened for reading /proc/783/status pgrep File opened for reading /proc/202/cmdline pidof File opened for reading /proc/89/status pgrep File opened for reading /proc/173/status pgrep File opened for reading /proc/440/cmdline pidof File opened for reading /proc/1112/status pgrep File opened for reading /proc/971/cmdline pgrep File opened for reading /proc/449/cmdline pgrep File opened for reading /proc/1361/cmdline pgrep File opened for reading /proc/1003/status pgrep File opened for reading /proc/481/stat pidof File opened for reading /proc/1/cmdline pgrep File opened for reading /proc/85/cmdline pidof File opened for reading /proc/581/cmdline pgrep File opened for reading /proc/85/cmdline pidof File opened for reading /proc/102/status pgrep File opened for reading /proc/1078/status pgrep File opened for reading /proc/1075/cmdline pidof File opened for reading /proc/1003/stat pidof
Processes
-
/tmp/600f201eae40de7a598b2d08b190d07f07a3988b889200f5d36d30619fa7e478.elf/tmp/600f201eae40de7a598b2d08b190d07f07a3988b889200f5d36d30619fa7e478.elf1⤵
- Deletes itself
- Modifies hosts file
- Modifies systemd
- Write file to user bin folder
PID:1401 -
/bin/shsh -c "pgrep 600f201eae40de7a598b2d08b190d07f07a3988b889200f5d36d30619fa7e478.elf"2⤵PID:1404
-
/usr/bin/pgreppgrep 600f201eae40de7a598b2d08b190d07f07a3988b889200f5d36d30619fa7e478.elf3⤵
- Reads CPU attributes
- Reads runtime system information
PID:1405
-
-
-
/bin/shsh -c "pidof 600f201eae40de7a598b2d08b190d07f07a3988b889200f5d36d30619fa7e478.elf"2⤵PID:1447
-
/usr/bin/pidofpidof 600f201eae40de7a598b2d08b190d07f07a3988b889200f5d36d30619fa7e478.elf3⤵
- Reads runtime system information
PID:1448
-
-
-
/bin/shsh -c "pgrep uplugplay"2⤵PID:1451
-
/usr/bin/pgreppgrep uplugplay3⤵
- Reads CPU attributes
- Reads runtime system information
PID:1452
-
-
-
/bin/shsh -c "pidof uplugplay"2⤵PID:1455
-
/usr/bin/pidofpidof uplugplay3⤵
- Reads runtime system information
PID:1456
-
-
-
/bin/shsh -c "pgrep upnpsetup"2⤵PID:1459
-
/usr/bin/pgreppgrep upnpsetup3⤵
- Reads CPU attributes
- Reads runtime system information
PID:1460
-
-
-
/bin/shsh -c "pidof upnpsetup"2⤵PID:1463
-
/usr/bin/pidofpidof upnpsetup3⤵
- Reads runtime system information
PID:1464
-
-
-
/bin/shsh -c "systemctl daemon-reload"2⤵PID:1466
-
/usr/bin/systemctlsystemctl daemon-reload3⤵
- Reads EFI boot settings
- Reads runtime system information
PID:1467
-
-
-
/bin/shsh -c "systemctl enable uplugplay.service"2⤵PID:1500
-
/usr/bin/systemctlsystemctl enable uplugplay.service3⤵
- Reads EFI boot settings
PID:1501
-
-
-
/bin/shsh -c "systemctl start uplugplay.service"2⤵PID:1535
-
/usr/bin/systemctlsystemctl start uplugplay.service3⤵
- Reads EFI boot settings
PID:1536
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1XDG Autostart Entries
1Create or Modify System Process
1Systemd Service
1Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145B
MD58ca62d1f47880bce036c2956c9b7b272
SHA13bcc3a5c4fcc5b0d08c4524a59f6b8e113b62060
SHA256c655d3d4e374fad38313ec4262207b2d7d68a870238f203ef3c33f85e66c8e32
SHA5124cd2d9d67151fa25e833707dee2442c4a5f752053fc2c36ec73c0e2b734c66ca69c63fceb47714d9add5b9fe2eee1e45be5199e2cae7c26173e766b333877da6
-
Filesize
418KB
MD571500ca140a274e2e1c190e0eba34aee
SHA1e8e80b358732eb978536e0f1a77baf69a8746d99
SHA256600f201eae40de7a598b2d08b190d07f07a3988b889200f5d36d30619fa7e478
SHA512448a434e8df285a328971fdb1b1b4dd2ca46029de8099eaa8e468ce0ce20328e90af4012f77d8fec8d6b7fd12af65f58877d075bc5684c68abf60619b6770105