HIGH 'Process Injection - 288965039' along with 3 other issues

RESOLVED SECURITY TESTING ID: #391 | Created: 2026-01-05 16:28:11
4
Alerts
1
Hosts
13
Files
0
Network
Incident Overview

'Process Injection - 288965039' along with 3 other issues generated by XDR Agent and XDR BIOC detected on host in-bridge-40 involving 2 users

4
2026-01-05 16:34
Unassigned
XDR Agent, XDR BIOC
Malware Execution
Affected Hosts & Users
root in-bridge-40\dsst
File Artifacts 13
File Name Path SHA256 Signature Verdict Actions
sshd - 090ecdb53316ebadc17949e4699540588dcb0896dbb0a8ae93da72a8e20ad781 SIGNATURE_UNAVAILABLE UNKNOWN VT
98-reboot-required - ede15e980ec54e7211923a42b77531ee06a15e2a728f645004b4c0fff3d660f7 SIGNATURE_UNAVAILABLE UNKNOWN VT
run-parts - 6662ac8211738cab5e9c8138f92c9f54319a1892ec3da24f47620d46963671a8 SIGNATURE_UNAVAILABLE UNKNOWN VT
update-motd-fsck-at-reboot - 88b40e43ddc24e66a2056388ac737f018af1cf92ce878431927226ced511f731 SIGNATURE_UNAVAILABLE UNKNOWN VT
cat - 210ffa7daedb3ef6e9230d391e9a10043699ba81080ebf40c6de70ed77e278ba SIGNATURE_UNAVAILABLE UNKNOWN VT
update-motd-reboot-required - e18f8d28bdff7d892991fb2c9d723964672f651225aaf03fe3848c215da1ecbe SIGNATURE_UNAVAILABLE UNKNOWN VT
sh - 4f291296e89b784cd35479fca606f228126e3641f5bcaee68dee36583d7c9483 SIGNATURE_UNAVAILABLE UNKNOWN VT
bash - 59474588a312b6b6e73e5a42a59bf71e62b55416b6c9d5e4a6e1c630c2a9ecd4 SIGNATURE_UNAVAILABLE UNKNOWN VT
timeout - 8d21b4cf1b204cc2387377a63c542ecdd0ae0895613db67ceb7da1e253110741 SIGNATURE_UNAVAILABLE UNKNOWN VT
crontab - 11651a4bd5c9605dac9df09bcb1ce16e40e740558766081a784e16db0098c042 SIGNATURE_UNAVAILABLE UNKNOWN VT
date - 08b85d43067bcd15edb0882d5372a8b5635e211f76b62ccc4d575f2ed4920e18 SIGNATURE_UNAVAILABLE UNKNOWN VT
perl - 367271e451185cad9ba61d13aa9bcbc60f880814eb77e171cbecf05f9077badd SIGNATURE_UNAVAILABLE UNKNOWN VT
netstat - 6964174e8c4af7c39b39b1ad3a682b3120878bdfd4950e02f67f15908db73e72 SIGNATURE_UNAVAILABLE UNKNOWN VT
Network Artifacts 0
No network artifacts found for this incident
Process Artifacts 4
Process Command Line Parent Process User
sshd sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups sshd root
sshd sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups sshd root
timeout timeout 2 perl -e use Socket;socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"))... sshd in-bridge-40\dsst
sshd sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups sshd root
Registry Artifacts 0
No registry artifacts found for this incident
Analyst Verdict
HIGH
  • Isolate affected endpoints
  • Investigate all related alerts
  • Document findings
Summary
4
Alerts
1
Hosts
13
Files
0
Network
Alert Categories
Malware Execution
Timeline
01-05 16:34:22
Incident Modified
Status or details updated
01-05 16:34:22
Incident Resolved
resolved security testing
01-05 16:33:49
Process Injection - 288965039
high - Detected (Reported)
01-05 16:28:11
Incident Created
#391 - 'Process Injection - 288965039' along with 3 other issues
01-05 16:28:11
Persistency - 779040014
high - Prevented (Blocked)
01-05 16:28:11
sshd
Verdict: Unknown
01-05 16:28:11
98-reboot-required
Verdict: Unknown
01-05 16:28:11
run-parts
Verdict: Unknown
01-05 16:28:11
update-motd-fsck-at-reboot
Verdict: Unknown
01-05 16:28:11
cat
Verdict: Unknown
01-05 16:28:11
update-motd-reboot-required
Verdict: Unknown
01-05 16:28:11
sh
Verdict: Unknown
01-05 16:28:11
bash
Verdict: Unknown
01-05 16:28:11
timeout
Verdict: Unknown
01-05 16:28:11
crontab
Verdict: Unknown
01-05 16:28:07
Perl script connecting to network
medium - Detected
01-05 16:28:05
Process Injection - 288965039
high - Detected (Reported)