Linux Servers Exploited by Prometei Botnet for Cryptocurrency Mining

Security researchers from Palo Alto Networks’ Unit 42 identified a significant increase in attacks targeting Linux servers using newly evolved variants of the Prometei botnet.

Originally detected in 2020, Prometei has expanded far beyond its initial Windows focus and now employs sophisticated methods to compromise Linux environments, primarily for illicit Monero (XMR) mining and credential theft.

Infection Chain

Prometei’s Linux branch reflects ongoing and active development, establishing it as a formidable, multipurpose modular threat.

The malware is distributed primarily via HTTP GET requests to attacker-controlled infrastructure, specifically hxxp://103.41.204[.]104/k.php?a=x86_64.

The distributed executable, misleadingly named with a .php extension, is not a PHP script but a UPX-packed 64-bit ELF binary designed for stealth and anti-analysis.

Prometei Botnet
Interpretation of the UPX PackHeader and overlay_offset trailer for the sample.

This packing technique, present in versions released since March 2025, impedes standard forensic unpacking by embedding custom JSON configuration trailers.

Upon execution, the malware decompresses itself in memory, launches the real payload, and begins system profiling.

Prometei harvests processor, motherboard, OS, uptime, and kernel details using typical Linux utilities (/proc/cpuinfo, dmidecode, /etc/os-release, uname -a).

This data is exfiltrated to its command and control (C2) endpoint at hxxp://152.36.128[.]18/cgi-bin/p.cgi.

Threat Capabilities

Prometei deploys a variety of modules to fulfill its core objectives:

  • Initial Exploitation: Brute-forcing administrator credentials and exploiting known protocol vulnerabilities such as SMB.
  • Payload Delivery & Lateral Movement: Self-propagation through networked Linux and Windows systems.
  • Cryptomining: Leveraging infected host resources for Monero mining.
  • Credential Theft & Data Exfiltration: Harvesting sensitive information and maintaining secure remote access.

A notable architectural feature is Prometei’s use of a domain generation algorithm (DGA), ensuring resiliency for its C2 communications even if domains are blocklisted.

Crucially, the malware is self-updating, capable of replacing or augmenting its modules on infected systems without requiring a new infection chain substantially increasing persistence and adaptability.

Prometei’s adaptations, including anti-forensic UPX packing and dynamic configuration, make detection challenging.

However, updated behavioral analytics and signature-based detection such as YARA rules identifying UPX-packed Linux binaries with appended JSON remain effective.

Security teams are urged to maintain vigilance and ensure robust endpoint and network defense postures, focusing on anomaly detection and rapid response.

Palo Alto Networks has responded by deploying updated threat intelligence and protections across its Cortex XDR, XSIAM, Advanced WildFire, and network security solutions.

The international security community, coordinated via the Cyber Threat Alliance, has been warned to ensure swift global disruption of the botnet’s infrastructure.

Security teams and administrators are urged to review systems for these indicators and strengthen preventive controls on Linux infrastructure amid this persistent botnet threat.

Indicators of Compromise (IOC)

TypeIndicatorDescription/Version
SHA-256 Hash46cf75d7440c30cbfd101dd396bb18dc3ea0b9fe475eb80c4545868aab5c578cv2.87X
SHA-256 Hashcc7ab872ed9c25d4346b4c58c5ef8ea48c2d7b256f20fe2f0912572208df5c1av3.05L
SHA-256 Hash205c2a562bb393a13265c8300f5f7e46d3a1aabe057cb0b53d8df92958500867v4.02V
SHA-256 Hash656fa59c4acf841dcc3db2e91c1088daa72f99b468d035ff79d31a8f47d320efv4.02V
SHA-256 Hash67279be56080b958b04a0f220c6244ea4725f34aa58cf46e5161cfa0af0a3fb0v4.02V
SHA-256 Hash7a027fae1d7460fc5fccaf8bed95e9b28167023efcbb410f638c5416c6af53ffv4.02V
SHA-256 Hash87f5e41cbc5a7b3f2862fed3f9458cd083979dfce45877643ef68f4c2c48777ev4.02V
SHA-256 Hashb1d893c8a65094349f9033773a845137e9a1b4fa9b1f57bdb57755a2a2dcb708v4.02V
SHA-256 Hashd21c878dcc169961bebda6e7712b46adf5ec3818cc9469debf1534ffa8d74fb7v4.02V
SHA-256 Hashd4566c778c2c35e6162a8e65bb297c3522dd481946b81baffc15bb7d7a4fe531v4.08V
URLhxxp://103.41.204[.]104/k.phpMalware distribution
URLhxxp://152.36.128[.]18/cgi-bin/p.cgiC2 server

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates

Mandvi
Mandvi
Mandvi is a Security Reporter covering data breaches, malware, cyberattacks, data leaks, and more at Cyber Press.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here