Malware Analysis Report

2025-06-16 02:03

Sample ID 250222-elxl6syjar
Target 67c74b4bbb08c4ac8b33546aa4df52fc09ac33e557f42de641b3506ac7dbfd0d.elf
SHA256 67c74b4bbb08c4ac8b33546aa4df52fc09ac33e557f42de641b3506ac7dbfd0d
Tags
upx prometei_elf botnet discovery miner persistence privilege_escalation
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

67c74b4bbb08c4ac8b33546aa4df52fc09ac33e557f42de641b3506ac7dbfd0d

Threat Level: Known bad

The file 67c74b4bbb08c4ac8b33546aa4df52fc09ac33e557f42de641b3506ac7dbfd0d.elf was found to be: Known bad.

Malicious Activity Summary

upx prometei_elf botnet discovery miner persistence privilege_escalation

Prometei

Prometei_elf family

Deletes itself

Modifies hosts file

Write file to user bin folder

Enumerates running processes

Modifies systemd

UPX packed file

Reads CPU attributes

Enumerates kernel/hardware configuration

Reads runtime system information

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2025-02-22 04:02

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2025-02-22 04:02

Reported

2025-02-22 04:04

Platform

ubuntu2404-amd64-20240523-en

Max time kernel

7s

Max time network

132s

Command Line

[/tmp/67c74b4bbb08c4ac8b33546aa4df52fc09ac33e557f42de641b3506ac7dbfd0d.elf]

Signatures

Prometei

botnet miner prometei_elf

Prometei_elf family

prometei_elf

Deletes itself

Description Indicator Process Target
N/A N/A /tmp/67c74b4bbb08c4ac8b33546aa4df52fc09ac33e557f42de641b3506ac7dbfd0d.elf N/A

Modifies hosts file

Description Indicator Process Target
File opened for modification /etc/hosts /tmp/67c74b4bbb08c4ac8b33546aa4df52fc09ac33e557f42de641b3506ac7dbfd0d.elf N/A

Enumerates running processes

Modifies systemd

persistence privilege_escalation
Description Indicator Process Target
File opened for modification /lib/systemd/system/uplugplay.service /tmp/67c74b4bbb08c4ac8b33546aa4df52fc09ac33e557f42de641b3506ac7dbfd0d.elf N/A

Write file to user bin folder

persistence
Description Indicator Process Target
File opened for modification /usr/sbin/uplugplay /tmp/67c74b4bbb08c4ac8b33546aa4df52fc09ac33e557f42de641b3506ac7dbfd0d.elf N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Reads CPU attributes

discovery
Description Indicator Process Target
File opened for reading /sys/devices/system/cpu/possible /usr/bin/pgrep N/A
File opened for reading /sys/devices/system/cpu/possible /usr/bin/pgrep N/A
File opened for reading /sys/devices/system/cpu/possible /usr/bin/pgrep N/A

Enumerates kernel/hardware configuration

discovery
Description Indicator Process Target
File opened for reading /sys/devices/system/node /usr/bin/pgrep N/A
File opened for reading /sys/devices/system/node /usr/bin/pgrep N/A
File opened for reading /sys/devices/system/node /usr/bin/pgrep N/A

Reads runtime system information

discovery
Description Indicator Process Target
File opened for reading /proc/12/cgroup /usr/bin/pgrep N/A
File opened for reading /proc/747/cmdline /usr/bin/pidof N/A
File opened for reading /proc/2185/ctty /usr/bin/pgrep N/A
File opened for reading /proc/2292/ctty /usr/bin/pgrep N/A
File opened for reading /proc/2492/cgroup /usr/bin/pgrep N/A
File opened for reading /proc/747/stat /usr/bin/pidof N/A
File opened for reading /proc/2232/stat /usr/bin/pgrep N/A
File opened for reading /proc/1855/stat /usr/bin/pidof N/A
File opened for reading /proc/2222/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/24/status /usr/bin/pgrep N/A
File opened for reading /proc/25/status /usr/bin/pgrep N/A
File opened for reading /proc/591/cgroup /usr/bin/pgrep N/A
File opened for reading /proc/8/cmdline /usr/bin/pidof N/A
File opened for reading /proc/7/cgroup /usr/bin/pgrep N/A
File opened for reading /proc/2198/ctty /usr/bin/pgrep N/A
File opened for reading /proc/35/cmdline /usr/bin/pidof N/A
File opened for reading /proc/594/ctty /usr/bin/pgrep N/A
File opened for reading /proc/2184/stat /usr/bin/pgrep N/A
File opened for reading /proc/2481/stat /usr/bin/pgrep N/A
File opened for reading /proc/1970/cmdline /usr/bin/pidof N/A
File opened for reading /proc/37/ctty /usr/bin/pgrep N/A
File opened for reading /proc/778/status /usr/bin/pgrep N/A
File opened for reading /proc/2270/ctty /usr/bin/pgrep N/A
File opened for reading /proc/199/ctty /usr/bin/pgrep N/A
File opened for reading /proc/32/cgroup /usr/bin/pgrep N/A
File opened for reading /proc/1399/stat /usr/bin/pgrep N/A
File opened for reading /proc/47/stat /usr/bin/pidof N/A
File opened for reading /proc/1934/cmdline /usr/bin/pidof N/A
File opened for reading /proc/1878/cgroup /usr/bin/pgrep N/A
File opened for reading /proc/50/cmdline /usr/bin/pidof N/A
File opened for reading /proc/789/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/11/ctty /usr/bin/pgrep N/A
File opened for reading /proc/34/cgroup /usr/bin/pgrep N/A
File opened for reading /proc/386/ctty /usr/bin/pgrep N/A
File opened for reading /proc/1779/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/2136/stat /usr/bin/pidof N/A
File opened for reading /proc/3/cgroup /usr/bin/pgrep N/A
File opened for reading /proc/50/cmdline /usr/bin/pidof N/A
File opened for reading /proc/789/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/793/status /usr/bin/pgrep N/A
File opened for reading /proc/1858/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/1337/cgroup /usr/bin/pgrep N/A
File opened for reading /proc/2493/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/1957/cmdline /usr/bin/pidof N/A
File opened for reading /proc/63/stat /usr/bin/pgrep N/A
File opened for reading /proc/1858/status /usr/bin/pgrep N/A
File opened for reading /proc/2252/ctty /usr/bin/pgrep N/A
File opened for reading /proc/11/cgroup /usr/bin/pgrep N/A
File opened for reading /proc/24/cgroup /usr/bin/pgrep N/A
File opened for reading /proc/53/status /usr/bin/pgrep N/A
File opened for reading /proc/1068/cgroup /usr/bin/pgrep N/A
File opened for reading /proc/39/stat /usr/bin/pidof N/A
File opened for reading /proc/1879/ctty /usr/bin/pgrep N/A
File opened for reading /proc/70/cmdline /usr/bin/pidof N/A
File opened for reading /proc/38/status /usr/bin/pgrep N/A
File opened for reading /proc/6/stat /usr/bin/pidof N/A
File opened for reading /proc/390/cmdline /usr/bin/pidof N/A
File opened for reading /proc/9/stat /usr/bin/pidof N/A
File opened for reading /proc/2326/cmdline /usr/bin/pidof N/A
File opened for reading /proc/1831/cmdline /usr/bin/pgrep N/A
File opened for reading /proc/15/cmdline /usr/bin/pidof N/A
File opened for reading /proc/9/stat /usr/bin/pgrep N/A
File opened for reading /proc/56/ctty /usr/bin/pgrep N/A
File opened for reading /proc/2475/cmdline /usr/bin/pgrep N/A

Processes

/tmp/67c74b4bbb08c4ac8b33546aa4df52fc09ac33e557f42de641b3506ac7dbfd0d.elf

[/tmp/67c74b4bbb08c4ac8b33546aa4df52fc09ac33e557f42de641b3506ac7dbfd0d.elf]

/bin/sh

[sh -c pgrep 67c74b4bbb08c4ac8b33546aa4df52fc09ac33e557f42de641b3506ac7dbfd0d.elf]

/usr/bin/pgrep

[pgrep 67c74b4bbb08c4ac8b33546aa4df52fc09ac33e557f42de641b3506ac7dbfd0d.elf]

/bin/sh

[sh -c pidof 67c74b4bbb08c4ac8b33546aa4df52fc09ac33e557f42de641b3506ac7dbfd0d.elf]

/usr/bin/pidof

[pidof 67c74b4bbb08c4ac8b33546aa4df52fc09ac33e557f42de641b3506ac7dbfd0d.elf]

/bin/sh

[sh -c pgrep uplugplay]

/usr/bin/pgrep

[pgrep uplugplay]

/bin/sh

[sh -c pidof uplugplay]

/usr/bin/pidof

[pidof uplugplay]

/bin/sh

[sh -c pgrep upnpsetup]

/usr/bin/pgrep

[pgrep upnpsetup]

/bin/sh

[sh -c pidof upnpsetup]

/usr/bin/pidof

[pidof upnpsetup]

/bin/sh

[sh -c systemctl daemon-reload]

/usr/bin/systemctl

[systemctl daemon-reload]

/bin/sh

[sh -c systemctl enable uplugplay.service]

/usr/bin/systemctl

[systemctl enable uplugplay.service]

/bin/sh

[sh -c systemctl start uplugplay.service]

/usr/bin/systemctl

[systemctl start uplugplay.service]

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 p3.feefreepool.net udp
DE 88.198.246.242:80 p3.feefreepool.net tcp

Files

memory/2477-1-0x0000000000400000-0x00000000015640f8-memory.dmp

/usr/sbin/uplugplay

MD5 acb82fbd3ed6a6bd8e4411038ed48fbd
SHA1 fa61891bc4ef7d6e023f94333b1695106767c3e3
SHA256 67c74b4bbb08c4ac8b33546aa4df52fc09ac33e557f42de641b3506ac7dbfd0d
SHA512 f25d22737efaab07ab6688a5a17ef33de27ac9b8bb900f4d45733260135b9d95792c85bb5e8774541b4fc8b1a3f5844216e491e22191c9317d9d263639ddbe32

/usr/lib/systemd/system/uplugplay.service

MD5 8ca62d1f47880bce036c2956c9b7b272
SHA1 3bcc3a5c4fcc5b0d08c4524a59f6b8e113b62060
SHA256 c655d3d4e374fad38313ec4262207b2d7d68a870238f203ef3c33f85e66c8e32
SHA512 4cd2d9d67151fa25e833707dee2442c4a5f752053fc2c36ec73c0e2b734c66ca69c63fceb47714d9add5b9fe2eee1e45be5199e2cae7c26173e766b333877da6