MEDIUM Perl script connecting to network
Detected
ID: #34413
|
Detected: 2026-01-15 08:47:15
|
Execution
Alert Overview
Process action type = execution AND target process cmd = *socket*connect*sock_stream*, *socket*sock_stream*connect* AND target process name = perl
Unclassified
XDR BIOC
New
DS:PANW/XDR Agent
DOM:Security
Host Information
Process Information
Process Execution
Actor Process (Executor)
| Process Name | timeout |
|---|---|
| Path | /usr/bin/timeout |
| PID | 639723 |
| SHA256 |
8d21b4cf1b204cc2387377a63c542ecdd0ae0895613db67ceb7da1e253110741
VT
|
| MD5 | aad1cf7dc891dcc413cb85200ba3116d |
timeout 2 perl -e use Socket;socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));connect(S,sockaddr_in(4444,inet_aton("10.10.10.10")));
Action Process (Target)
| Process Name | perl |
|---|---|
| SHA256 |
367271e451185cad9ba61d13aa9bcbc60f880814eb77e171cbecf05f9077badd
VT
|
perl -e use Socket;socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));connect(S,sockaddr_in(4444,inet_aton("10.10.10.10")));
Parent Process (Causality)
| Process Name | sshd |
|---|---|
| Path | /usr/sbin/sshd |
| SHA256 |
090ecdb53316ebadc17949e4699540588dcb0896dbb0a8ae93da72a8e20ad781
VT
|
| MD5 | ed2dbc5f1b4c5ab0cce023904ed1db69 |
sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups
MITRE ATT&CK Mapping
Severity Analysis
MEDIUM
Review and assess impact
Summary
Events
1
IP Addresses
1
Tags
2
File Artifacts
Yes
Network Artifacts
No
Registry Artifacts
No
Analyst Verdict