HIGH 'Staged Malware Activity - 2123359011' along with 26 other issues

RESOLVED SECURITY TESTING ID: #1911 | Created: 2026-01-17 09:30:07
27
Alerts
3
Hosts
31
Files
0
Network
Incident Overview

'Staged Malware Activity - 2123359011' along with 26 other issues generated by XDR Agent and XDR BIOC detected on 3 hosts involving 2 users

27
2026-01-17 09:34
Unassigned
XDR Agent, XDR BIOC
Malware Execution
Affected Hosts & Users
root in-bridge-40\dsst
File Artifacts 31
File Name Path SHA256 Signature Verdict Actions
98-reboot-required - ede15e980ec54e7211923a42b77531ee06a15e2a728f645004b4c0fff3d660f7 SIGNATURE_UNAVAILABLE UNKNOWN VT
update-motd-reboot-required - e18f8d28bdff7d892991fb2c9d723964672f651225aaf03fe3848c215da1ecbe SIGNATURE_UNAVAILABLE UNKNOWN VT
sh - 86d31f6fb799e91fa21bad341484564510ca287703a16e9e46c53338776f4f42 SIGNATURE_UNAVAILABLE UNKNOWN VT
run-parts - 3f36124107498d18ddacfbfe773df11e7094d5d143194cdfcec8804cccc81f64 SIGNATURE_UNAVAILABLE UNKNOWN VT
update-motd-fsck-at-reboot - ee7dc35db83e025c41460b03c37bf45f03c7f7d654b74bd3828cb9af107d90d1 SIGNATURE_UNAVAILABLE UNKNOWN VT
sshd - 4cc983fa8f3a26626981dbbe79113348fb86cca3ec426f6af5fabd08215fd5e1 SIGNATURE_UNAVAILABLE UNKNOWN VT
cat - 90c9437a02857838ccc0ce1ff8652691181bfb67135a1173dd276f91fa57d7ec SIGNATURE_UNAVAILABLE UNKNOWN VT
bash - bc5945feb8bd26203ebfafea5ce1878bb2e32cb8fb50ab7ae395cfb1e1aaaef1 SIGNATURE_UNAVAILABLE UNKNOWN VT
zsh - f88db3dd0a2909ed62cdb645dbb7b56a6bee5abbe310751dc0f549a811222f46 SIGNATURE_UNAVAILABLE UNKNOWN VT
sshd - 090ecdb53316ebadc17949e4699540588dcb0896dbb0a8ae93da72a8e20ad781 SIGNATURE_UNAVAILABLE UNKNOWN VT
update-motd-fsck-at-reboot - 88b40e43ddc24e66a2056388ac737f018af1cf92ce878431927226ced511f731 SIGNATURE_UNAVAILABLE UNKNOWN VT
sh - 4f291296e89b784cd35479fca606f228126e3641f5bcaee68dee36583d7c9483 SIGNATURE_UNAVAILABLE UNKNOWN VT
run-parts - 6662ac8211738cab5e9c8138f92c9f54319a1892ec3da24f47620d46963671a8 SIGNATURE_UNAVAILABLE UNKNOWN VT
bash - 59474588a312b6b6e73e5a42a59bf71e62b55416b6c9d5e4a6e1c630c2a9ecd4 SIGNATURE_UNAVAILABLE UNKNOWN VT
cat - 210ffa7daedb3ef6e9230d391e9a10043699ba81080ebf40c6de70ed77e278ba SIGNATURE_UNAVAILABLE UNKNOWN VT
sleep - 06d3927480c7554337818dbf5d91d78689bc8321237280e3d452028d5d1c3f43 SIGNATURE_UNAVAILABLE UNKNOWN VT
crontab - d71b4e26034ec955cae7e7101a4b33f5923b3396a0e1e1893cd1274bbb51c3ec SIGNATURE_UNAVAILABLE UNKNOWN VT
date - 08b85d43067bcd15edb0882d5372a8b5635e211f76b62ccc4d575f2ed4920e18 SIGNATURE_UNAVAILABLE UNKNOWN VT
whoami - 515743f4f9c88b1579af8bcc3124b0f376003df7babf47daab1852d52b752171 SIGNATURE_UNAVAILABLE UNKNOWN VT
ls - 0148f5ab3062a905281d8deb9645363da5131011c9e7b6dcaa38b504e41b68ea SIGNATURE_UNAVAILABLE UNKNOWN VT
ls - 12a6d908a68ccf6f9f3d799705577c28763f5deef6eddcff7643d6d8a6de543d SIGNATURE_UNAVAILABLE UNKNOWN VT
netstat - d0a6881ccac8d74a2c9f81768fd3794c662b26a0ff259b7619406eb65f7238ff SIGNATURE_UNAVAILABLE UNKNOWN VT
base64 - e8e52c2af48cbd8202304496b3f7d05f53a2ecc4b3fb0f1b81acfed58e57a042 SIGNATURE_UNAVAILABLE UNKNOWN VT
whoami - 38433f7ca2a213ae627ccc4fc44b9db8c9a6873123f6bef16e2db325e114740d SIGNATURE_UNAVAILABLE UNKNOWN VT
curl - aca992dba6da014cd5baaa739624e68362c8930337f3a547114afdbd708d06a4 SIGNATURE_UNAVAILABLE UNKNOWN VT
cron - 6bd8593640af2413bce259fa0affc18dbf149892756ebe805bf316624f8b590f SIGNATURE_UNAVAILABLE UNKNOWN VT
id - 2477c312a6fd6beb585ccbfccaf78cc0c742b65f0bda6a308f6d239d35ffc3e4 SIGNATURE_UNAVAILABLE UNKNOWN VT
date - 423e1cf8af70dd477a56d019912e13660199df3a01420f5ced7dadcc2b786bdc SIGNATURE_UNAVAILABLE UNKNOWN VT
perl - 367271e451185cad9ba61d13aa9bcbc60f880814eb77e171cbecf05f9077badd SIGNATURE_UNAVAILABLE UNKNOWN VT
netstat - 6964174e8c4af7c39b39b1ad3a682b3120878bdfd4950e02f67f15908db73e72 SIGNATURE_UNAVAILABLE UNKNOWN VT
timeout - 8d21b4cf1b204cc2387377a63c542ecdd0ae0895613db67ceb7da1e253110741 SIGNATURE_UNAVAILABLE UNKNOWN VT
Network Artifacts 0
No network artifacts found for this incident
Process Artifacts 27
Process Command Line Parent Process User
sshd sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups sshd root
sshd sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups sshd root
sshd sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups sshd root
sshd sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups sshd root
sshd sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups sshd root
sshd sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups sshd root
sshd sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups sshd root
sshd sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups sshd root
sshd sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups sshd root
sshd sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups sshd root
sshd sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups sshd root
sshd sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups sshd root
sshd sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups sshd root
sshd sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups sshd root
sshd sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups sshd root
sshd sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups sshd root
sshd sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups sshd root
sshd sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups sshd root
timeout timeout 2 perl -e use Socket;socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"))... sshd in-bridge-40\dsst
sshd sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups sshd root
Registry Artifacts 0
No registry artifacts found for this incident
Analyst Verdict
HIGH
Auto resolved by XdrTestManager (alerts: 27)
  • Isolate affected endpoints
  • Investigate all related alerts
  • Document findings
Summary
27
Alerts
3
Hosts
31
Files
0
Network
Alert Categories
Malware Execution
Timeline
01-17 09:34:02
Incident Modified
Status or details updated
01-17 09:34:02
Incident Resolved
resolved security testing
01-17 09:32:16
Process Injection - 288965039
high - Detected (Reported)
01-17 09:32:14
Persistency - 779040014
high - Prevented (Blocked)
01-17 09:32:12
Process Injection - 288965039
high - Detected (Reported)
01-17 09:32:04
Process Injection - 288965039
high - Prevented (Blocked)
01-17 09:31:55
Process Injection - 288965039
high - Detected (Reported)
01-17 09:31:40
Persistency - 456694134
high - Detected (Reported)
01-17 09:31:21
Process Injection - 288965039
high - Detected (Reported)
01-17 09:31:15
Process Injection - 288965039
high - Detected (Reported)
01-17 09:31:11
Process Injection - 288965039
high - Detected (Reported)
01-17 09:31:07
Process Injection - 288965039
high - Detected (Reported)
01-17 09:31:05
Process Injection - 288965039
high - Prevented (Blocked)
01-17 09:31:04
Process Injection - 288965039
high - Detected (Reported)
01-17 09:30:59
Process Injection - 288965039
high - Detected (Reported)
01-17 09:30:58
Process Injection - 288965039
high - Prevented (Blocked)
01-17 09:30:49
Process Injection - 288965039
high - Detected (Reported)
01-17 09:30:34
Process Injection - 288965039
high - Detected (Reported)
01-17 09:30:32
Persistency - 779040014
high - Prevented (Blocked)
01-17 09:30:30
Process Injection - 288965039
high - Detected (Reported)
01-17 09:30:20
Perl script connecting to network
medium - Detected
01-17 09:30:18
Process Injection - 288965039
high - Detected (Reported)
01-17 09:30:16
Process Injection - 288965039
high - Detected (Reported)
01-17 09:30:11
Persistency - 779040014
high - Prevented (Blocked)
01-17 09:30:07
Incident Created
#1911 - 'Staged Malware Activity - 2123359011' along with 26 other issues