Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

Prometei

111
Global rank
36 infographic chevron month
Month rank
30 infographic chevron week
Week rank
0
IOCs

Prometei is a modular botnet malware family that silently infiltrates systems, hijacking their resources for illicit Monero (XMR) mining. Active since at least 2016, it combines stealth, persistence, and lateral movement capabilities. Notable for its global reach and opportunistic infection strategy, it is also used for credential theft.

Botnet
Type
Unknown
Origin
1 March, 2016
First seen
20 September, 2025
Last seen

How to analyze Prometei with ANY.RUN

Type
Unknown
Origin
1 March, 2016
First seen
20 September, 2025
Last seen

IOCs

Hashes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 Seen at

Recent blog posts

post image
Efficient SOC: How to Detect and Solve Incide...
watchers 482
comments 0
post image
ANY.RUN & Palo Alto Networks Cortex XSOAR...
watchers 575
comments 0
post image
Lazarus Group Attacks in 2025: Here's Everyth...
watchers 3871
comments 0

What is Prometei Botnet?

The Prometei botnet represents one of the most persistent and evolving cryptocurrency mining threats in the cybersecurity landscape. There is evidence that it has been active since 2016, though it was described in 2020.

It is an advanced, multi-component malware system designed to mine cryptocurrency while staying under the radar. Written in multiple programming languages (including Delphi and PowerShell), it supports Windows and Linux platforms and is capable of self-propagation, data exfiltration, and command-and-control (C2) communications.

Its modular architecture allows attackers to dynamically deploy components like credential stealers, backdoors, and lateral movement tools based on the target environment. While its primary goal is cryptojacking, its deep penetration into systems makes it a gateway for broader cyber espionage or sabotage.

The botnet employs domain generation algorithms (DGA) for command and control communications, making it difficult to disrupt its operations through traditional domain blocking methods.

Recent analysis indicates that Prometei has experienced a significant resurgence since March 2025, with updated variants showing enhanced capabilities and more sophisticated anti-analysis features. The malware demonstrates continuous development, with threat actors regularly updating its modules and incorporating new exploitation techniques to maintain effectiveness against modern security measures.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Prometei Malware Victimology

Prometei’s victimology is opportunistic rather than highly targeted. It affects a wide range of industries, including finance, insurance, retail, manufacturing, utilities, travel, and construction.

It has been detected across the United States, the United Kingdom, Europe, South America, and East Asia. The botnet exploits unpatched systems, poorly configured servers, and devices with weak security, such as outdated Microsoft Exchange servers or IoT devices with default credentials.

Prometei has infected systems in over 90 countries, with particularly high concentrations observed in Brazil, Indonesia, and Turkey. Recent campaigns have shown over 10,000 systems compromised since November 2022.

What Prometei Botnet Can Do to User Device

Once installed on an endpoint device, Prometei can perform several malicious activities:

  • Cryptocurrency Mining: It hijacks computing resources to mine Monero, often causing significant performance degradation.
  • Credential Theft: It employs modules (e.g. Mimikatz) to harvest login credentials, sometimes using the WDigest protocol to store passwords in plaintext.
  • Data Theft: It can extract sensitive system information, including processor details, OS data, and network configurations.
  • Lateral Movement: It spreads within networks using protocols like RDP, SSH, and SMB.
  • Backdoor Installation: Newer versions include backdoors for persistent access and additional payload deployment.
  • Web Shell Deployment: It can install PHP-based web shells via a bundled Apache web server to execute remote commands.
  • Additional payload download.

How Prometei Malware Threatens Businesses and Organizations

For businesses and organizations, Prometei presents multifaceted threats that extend far beyond cryptocurrency mining. The malware's ability to steal credentials and move laterally through networks means that a single infected system can potentially compromise an entire organizational infrastructure.

The cryptojacking component results in significant financial losses through increased electricity costs, reduced productivity due to system performance degradation, and potential hardware damage requiring replacement. More critically, the backdoor capabilities provide persistent access that can be leveraged for more damaging attacks, including data exfiltration, deployment of additional malware, or ransomware attacks.

The malware's credential harvesting capabilities can result in violations of data protection regulations.

How Does Prometei Botnet Get in the System and Spread?

Similar to other botnets like Mirai and Gafgyt Prometei infects systems through:

  • Exploiting Vulnerabilities: It targets unpatched software, notably Microsoft Exchange Server flaws like ProxyLogon (associated with HAFNIUM attacks).
  • Brute-Force Attacks: It attempts to crack weak administrator passwords via RDP, SSH, or SMB.
  • Phishing Emails: Malicious attachments or links deliver the initial payload.
  • Drive-by Downloads: Compromised websites or fake software updates install the malware.

Once inside a system, it uses spreader modules to propagate across networks, scanning for additional vulnerable endpoints. Its worm-like capabilities enable rapid expansion within poorly secured environments.

How Does Prometei Botnet Function?

Prometei operates through a modular framework, with each component handling specific tasks:

  • Main Module: Executes initial infection and retrieves additional payloads.
  • Spreader Modules: Facilitate lateral movement via RDP, SSH, and SMB.
  • Cryptomining Module: Mines Monero using the infected device’s resources.
  • C2 Communication: Uses a Tor-based C2 server or DGA-generated domains to receive commands and exfiltrate data.
  • Persistence Mechanisms: Creates services, scheduled tasks, or cron jobs to ensure re-infection after system reboots.
  • Web Shell: Deploys a PHP-based web shell for remote command execution. Its self-updating feature and DGA enhance its resilience against takedown efforts.

The botnet utilizes domain generation algorithms to maintain communication with command and control servers, generating new domains dynamically to evade detection and blocking efforts. This technique ensures that even if security teams identify and block known malicious domains, the botnet can continue operating through newly generated communication channels.

Prometei's self-updating capabilities allow it to download and install new modules or updates automatically, ensuring that infected systems remain current with the latest malware variants. This feature contributes to the botnet's longevity and helps it adapt to changing security landscapes and defensive measures.

Prometei Botnet Typical Attack Chain

ANY.RUN’s Interactive Sandbox has seen a variety of Prometei malware samples analyzed by its global community of 500,000 users. Let’s explore one to see how the botnet infiltrates the system.

View analysis

Prometei malware analysis in the Sandbox Prometei Botnet sample detonated in the Sandbox

Prometei starts by making sure there is no older copy of itself on the machine. It searches the running processes for the names uplugplay and upnpsetup with the pgrep command. If it finds either name, it immediately stops those processes with killall5 and pidof. This step clears the way so only the newest version of the malware can run.

When the system is clean, Prometei creates a small file called /etc/CommId. Inside this file it writes a random twelve-character code; in the sample run the code was CPGP332GT4P7AH6F.

Prometei generates code to identify device Prometei generates a code to identify the infected endpoint

Right after that, the malware sends the code to its command-and-control server through an unencrypted HTTP request (http://152[.]36[.]128[.]18/cgi-bin/p.cgi?r=26&i=CPGP332GT4P7AH6F). The attackers use this code to recognize and track the infected computer.

Prometei sends code to c2c server The code gets sent to C2C server

Next, the malware makes sure it will survive a reboot. It drops a new systemd service file called uplugplay.service in the folder /lib/systemd/system/. The service is listed under the friendly name UPlugPlay and is set to run the program /usr/sbin/uplugplay.

Prometei persistence mechanism Part of Prometei persistence mechanism

Prometei copies its own binary into that location, deletes the original dropper, and then runs two shell commands: systemctl enables uplugplay.service and systemctl starts uplugplay.service. These commands turn the service on right away and guarantee it will start automatically whenever the operating system boots.

After installation, the program becomes quiet. It checks whether it was launched with an extra parameter, so it can switch from the installer role to its normal botnet duties. The parameter it expects later is “Dcomsvc”, which would be used like this: /usr/sbin/uplugplay -Dcomsvc. Once everything is in place, Prometei waits in the background for more instructions from its command-and-control server, ready to carry out whatever tasks the attackers send next.

Get started today for free

Analyze malware and phishing in a fully-interactive sandbox

Create free account

Gathering Threat Intelligence on Prometei malware

Threat intelligence plays a crucial role in defending against Prometei by providing actionable information about the malware's tactics, techniques, and procedures.

Behavioral intelligence describing Prometei's operational patterns helps security teams develop effective detection rules and monitoring strategies. Understanding the malware's lateral movement techniques and persistence mechanisms enables more comprehensive threat hunting activities.

Start gathering IOCs and behavioral data with the malware name search request to Threat Intelligence Lookup:

threatName:"prometei"

Prometei malware samples found via TI Lookup Prometei Botnet samples recently analyzed in ANY.RUN's Sandbox

Integrate ANY.RUN’s threat intelligence solutions in your company

Contact us

Conclusion

Prometei Botnet is more than just another cryptominer — it’s a modular, persistent, and evasive malware that undermines enterprise security while silently monetizing your infrastructure. With its stealth tactics, lateral movement, and built-in credential theft, it opens doors to deeper compromise. Preventing Prometei requires rigorous patching, strong authentication, and proactive threat intelligence. By understanding its tactics and staying informed with real-time threat data, organizations can turn the tide against this parasitic threat.

Gather fresh actionable threat intelligence via ANY.RUN’s TI Lookup: start with 50 trial requests.

HAVE A LOOK AT

Octo screenshot
Octo
octo coper
Octo malware, also known as ExobotCompact or Coper, is a sophisticated Android banking trojan that has evolved from earlier malware family Exobot. It poses a significant threat to financial institutions, mobile users, and enterprise networks.
Read More
Netwalker screenshot
Netwalker
netwalker ransomware
Netwalker is ransomware — it belongs to a malware family which encrypts files and demands users to pay a ransom to get their data back. Netwalker utilizes several sophisticated techniques, such as process hollowing and code obfuscation to target corporate victims.
Read More
Meduza Stealer screenshot
Meduza Stealer is an information-stealing malware primarily targeting Windows systems, designed to harvest sensitive data such as login credentials, browsing histories, cookies, cryptocurrency wallets, and password manager data. It has advanced anti-detection mechanisms, allowing it to evade many antivirus programs. The malware is distributed through various means, including phishing emails and malicious links. It’s marketed on underground forums and Telegram channels.
Read More
Raspberry Robin screenshot
Raspberry Robin
raspberryrobin
Raspberry Robin is a trojan that primarily spreads through infected USB drives and exploits legitimate Windows commands. This malware is known for its advanced obfuscation techniques, anti-debugging mechanisms, and ability to gain persistence on infected systems. Raspberry Robin often communicates with command-and-control servers over the TOR network and can download additional malicious payloads.
Read More
Balada Injector screenshot
Balada Injector is a long-running malware campaign that targets WordPress websites by exploiting vulnerabilities in plugins and themes. The attackers inject malicious code into compromised sites, leading to unauthorized redirects, data theft, and the creation of [backdoors](https://any.run/malware-trends/backdoor) for persistent access. The campaign operates in waves, with spikes in activity observed every few weeks, continually adapting to exploit newly discovered vulnerabilities.
Read More
Remcos screenshot
Remcos
remcos trojan rat stealer
Remcos is a RAT type malware that attackers use to perform actions on infected machines remotely. This malware is extremely actively caped up to date with updates coming out almost every single month.
Read More