Malware Analysis Report

2025-06-16 02:03

Sample ID 250222-ehf51sxrcq
Target 5f4d6d34ea5164b8e1c375dd3a7b1a909ba0c07f8abdaed4fc10382d68b7cde8.elf
SHA256 5f4d6d34ea5164b8e1c375dd3a7b1a909ba0c07f8abdaed4fc10382d68b7cde8
Tags
upx prometei_elf botnet discovery miner persistence privilege_escalation
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

5f4d6d34ea5164b8e1c375dd3a7b1a909ba0c07f8abdaed4fc10382d68b7cde8

Threat Level: Known bad

The file 5f4d6d34ea5164b8e1c375dd3a7b1a909ba0c07f8abdaed4fc10382d68b7cde8.elf was found to be: Known bad.

Malicious Activity Summary

upx prometei_elf botnet discovery miner persistence privilege_escalation

Prometei

Prometei_elf family

Deletes itself

Modifies hosts file

Write file to user bin folder

Enumerates running processes

Modifies systemd

UPX packed file

Reads CPU attributes

Reads runtime system information

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2025-02-22 03:56

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2025-02-22 03:56

Reported

2025-02-22 03:58

Platform

ubuntu1804-amd64-20240508-en

Max time kernel

6s

Max time network

129s

Command Line

[/tmp/5f4d6d34ea5164b8e1c375dd3a7b1a909ba0c07f8abdaed4fc10382d68b7cde8.elf]

Signatures

Prometei

botnet miner prometei_elf

Prometei_elf family

prometei_elf

Deletes itself

Description Indicator Process Target
N/A N/A /tmp/5f4d6d34ea5164b8e1c375dd3a7b1a909ba0c07f8abdaed4fc10382d68b7cde8.elf N/A

Modifies hosts file

Description Indicator Process Target
File opened for modification /etc/hosts /tmp/5f4d6d34ea5164b8e1c375dd3a7b1a909ba0c07f8abdaed4fc10382d68b7cde8.elf N/A

Enumerates running processes

Modifies systemd

persistence privilege_escalation
Description Indicator Process Target
File opened for modification /lib/systemd/system/uplugplay.service /tmp/5f4d6d34ea5164b8e1c375dd3a7b1a909ba0c07f8abdaed4fc10382d68b7cde8.elf N/A

Write file to user bin folder

persistence
Description Indicator Process Target
File opened for modification /usr/sbin/uplugplay /tmp/5f4d6d34ea5164b8e1c375dd3a7b1a909ba0c07f8abdaed4fc10382d68b7cde8.elf N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Reads CPU attributes

discovery
Description Indicator Process Target
File opened for reading /sys/devices/system/cpu/online /usr/bin/pgrep N/A
File opened for reading /sys/devices/system/cpu/online /usr/bin/pgrep N/A
File opened for reading /sys/devices/system/cpu/online /usr/bin/pgrep N/A

Reads runtime system information

discovery
Description Indicator Process Target
File opened for reading /proc/1485/cmdline /bin/pidof N/A
File opened for reading /proc/20/cmdline /bin/pidof N/A
File opened for reading /proc/11/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/494/status /usr/bin/pgrep N/A
File opened for reading /proc/1090/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/20/stat /bin/pidof N/A
File opened for reading /proc/1322/stat /bin/pidof N/A
File opened for reading /proc/174/status /usr/bin/pgrep N/A
File opened for reading /proc/1350/stat /bin/pidof N/A
File opened for reading /proc/1511/stat /bin/pidof N/A
File opened for reading /proc/476/status /usr/bin/pgrep N/A
File opened for reading /proc/34/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/28/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/78/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/177/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/1196/stat /bin/pidof N/A
File opened for reading /proc/1023/status /usr/bin/pgrep N/A
File opened for reading /proc/1157/status /usr/bin/pgrep N/A
File opened for reading /proc/22/cmdline /bin/pidof N/A
File opened for reading /proc/1292/stat /bin/pidof N/A
File opened for reading /proc/1157/status /usr/bin/pgrep N/A
File opened for reading /proc/213/stat /bin/pidof N/A
File opened for reading /proc/1267/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/1358/status /usr/bin/pgrep N/A
File opened for reading /proc/1153/status /usr/bin/pgrep N/A
File opened for reading /proc/178/cmdline /bin/pidof N/A
File opened for reading /proc/25/cmdline /bin/pidof N/A
File opened for reading /proc/696/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/599/cmdline /bin/pidof N/A
File opened for reading /proc/446/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/169/cmdline /bin/pidof N/A
File opened for reading /proc/1328/stat /bin/pidof N/A
File opened for reading /proc/170/status /usr/bin/pgrep N/A
File opened for reading /proc/1173/status /usr/bin/pgrep N/A
File opened for reading /proc/532/cmdline /bin/pidof N/A
File opened for reading /proc/1074/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/674/status /usr/bin/pgrep N/A
File opened for reading /proc/1157/cmdline /bin/pidof N/A
File opened for reading /proc/1182/status /usr/bin/pgrep N/A
File opened for reading /proc/1090/stat /bin/pidof N/A
File opened for reading /proc/1280/cmdline /bin/pidof N/A
File opened for reading /proc/420/status /usr/bin/pgrep N/A
File opened for reading /proc/19/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/1136/status /usr/bin/pgrep N/A
File opened for reading /proc/510/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/1203/stat /bin/pidof N/A
File opened for reading /proc/1080/status /usr/bin/pgrep N/A
File opened for reading /proc/493/cmdline /bin/pidof N/A
File opened for reading /proc/674/cmdline /bin/pidof N/A
File opened for reading /proc/1128/cmdline /bin/pidof N/A
File opened for reading /proc/22/status /usr/bin/pgrep N/A
File opened for reading /proc/476/cmdline /bin/pidof N/A
File opened for reading /proc/1358/stat /bin/pidof N/A
File opened for reading /proc/973/stat /bin/pidof N/A
File opened for reading /proc/1530/stat /bin/pidof N/A
File opened for reading /proc/510/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/1511/cmdline /bin/pidof N/A
File opened for reading /proc/487/cmdline /bin/pidof N/A
File opened for reading /proc/12/status /usr/bin/pgrep N/A
File opened for reading /proc/29/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/18/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/10/status /usr/bin/pgrep N/A
File opened for reading /proc/692/cmdline /bin/pidof N/A
File opened for reading /proc/23/stat /bin/pidof N/A

Processes

/tmp/5f4d6d34ea5164b8e1c375dd3a7b1a909ba0c07f8abdaed4fc10382d68b7cde8.elf

[/tmp/5f4d6d34ea5164b8e1c375dd3a7b1a909ba0c07f8abdaed4fc10382d68b7cde8.elf]

/bin/sh

[sh -c pgrep 5f4d6d34ea5164b8e1c375dd3a7b1a909ba0c07f8abdaed4fc10382d68b7cde8.elf]

/usr/bin/pgrep

[pgrep 5f4d6d34ea5164b8e1c375dd3a7b1a909ba0c07f8abdaed4fc10382d68b7cde8.elf]

/bin/sh

[sh -c pidof 5f4d6d34ea5164b8e1c375dd3a7b1a909ba0c07f8abdaed4fc10382d68b7cde8.elf]

/bin/pidof

[pidof 5f4d6d34ea5164b8e1c375dd3a7b1a909ba0c07f8abdaed4fc10382d68b7cde8.elf]

/bin/sh

[sh -c pgrep uplugplay]

/usr/bin/pgrep

[pgrep uplugplay]

/bin/sh

[sh -c pidof uplugplay]

/bin/pidof

[pidof uplugplay]

/bin/sh

[sh -c pgrep upnpsetup]

/usr/bin/pgrep

[pgrep upnpsetup]

/bin/sh

[sh -c pidof upnpsetup]

/bin/pidof

[pidof upnpsetup]

/bin/sh

[sh -c systemctl daemon-reload]

/bin/systemctl

[systemctl daemon-reload]

/bin/sh

[sh -c systemctl enable uplugplay.service]

/bin/systemctl

[systemctl enable uplugplay.service]

/bin/sh

[sh -c systemctl start uplugplay.service]

/bin/systemctl

[systemctl start uplugplay.service]

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 185.125.188.61:443 tcp
GB 185.125.188.61:443 tcp
US 151.101.1.91:443 tcp
US 151.101.1.91:443 tcp
GB 89.187.167.3:443 tcp
US 8.8.8.8:53 p3.feefreepool.net udp
DE 88.198.246.242:80 p3.feefreepool.net tcp

Files

memory/1516-1-0x0000000000400000-0x00000000015640f8-memory.dmp

/usr/sbin/uplugplay

MD5 387e1a014557790cc7c44dc59c48b8c6
SHA1 0de682082777e795545bb123dd0a748c6d665145
SHA256 5f4d6d34ea5164b8e1c375dd3a7b1a909ba0c07f8abdaed4fc10382d68b7cde8
SHA512 c2268518f7a2704b3d984c244d01abd7228b31cc91d427600b237f18c27b41ff10f375e48a1195a0bd79c47943ce5d65032f42f2aed19fe89d9324fa32bb6cee

/lib/systemd/system/uplugplay.service

MD5 8ca62d1f47880bce036c2956c9b7b272
SHA1 3bcc3a5c4fcc5b0d08c4524a59f6b8e113b62060
SHA256 c655d3d4e374fad38313ec4262207b2d7d68a870238f203ef3c33f85e66c8e32
SHA512 4cd2d9d67151fa25e833707dee2442c4a5f752053fc2c36ec73c0e2b734c66ca69c63fceb47714d9add5b9fe2eee1e45be5199e2cae7c26173e766b333877da6