Myrmex
Myrmex
Blog/Use Cases

Incident Response on Ubuntu: Real-Time Forensic Analysis with AI

Incident Response on Ubuntu: Real-Time Forensic Analysis with AI
UbuntuUBUNTU
Myrmex

The Challenge

A security alert indicated possible compromise of a production server. An immediate forensic analysis is necessary to determine if there was an intrusion or if it is a false positive.

The goal was to investigate:

  • Suspicious processes and external connections
  • Recently created users
  • Commands executed in the last 7 days
  • Files modified in the last 24 hours

The Prompt Sent to Myrmex

Using the integration with the Ubuntu server, we sent:

The server @ANX-SRV-01 might have been compromised,
I need you to investigate by doing an immediate forensics:

- Identify suspicious processes and external connections
- Check recently created users
- Analyze commands executed in the last 7 days
- Find files modified in the last 24 hours

Determine if it was hacked or is a false positive.
Generate an incident report with timeline.

Note: Myrmex activated the specialized agent Perseus for forensic artifact collection and analysis.

Forensic Analysis on Ubuntu via Myrmex


What Myrmex Found

🛡️ Verdict: False Positive

After detailed analysis, Myrmex determined that the activities were legitimate - administration, virtualization, and deployment testing operations.

Incident Timeline

Myrmex reconstructed the event chronology:

Date/TimeEventDescription
04-06/02Container ActivityMultiple executions of docker build and docker exec
07/02 16:26Administrative AccessSSH login by user viniciusls via internal IP
08/02 02:37System MaintenanceGRUB update and initrd images
08/02 22:46Processing SpikeInstallation process with high CPU consumption

Artifact Analysis

Processes and Connections

# Myrmex executed
ps aux --sort=-%cpu | head -20
netstat -tulpn
lsof -i -P

Result: High CPU usage caused by virtualization instances (QEMU/KVM) and agent installer. Legitimate external connections to monitoring endpoints.

Users

# Myrmex executed
cat /etc/passwd | tail -10
lastlog
grep "useradd" /var/log/auth.log

Result: No non-standard users created. Only viniciusls with recent sudo activity.

Executed Commands (7 days)

# Myrmex executed
cat /home/*/.bash_history
zcat /var/log/auth.log* | grep "sudo"

Result: Legitimate DevOps activities - Docker manipulation, driver adjustments, connectivity tests.

Modified Files (24h)

# Myrmex executed
find / -type f -mtime -1 -ls 2>/dev/null | head -50

Result: Modifications in /boot and /opt/vms consistent with kernel update and virtual disk operation.


Remediation Plan

Myrmex identified optimizations to avoid new alerts:

ItemImpactActionCommand
CPU at 99% (dpkg)CriticalFinish configurationsudo dpkg --configure -a
Accumulated LogsLowClean orphan containersdocker system prune -f
SSH Password AccessSecurityUse keys onlyEdit sshd_config
False PositivesOperationalCreate exception for QEMUConfigure threshold in Myrmex

Result

With the investigation performed by Myrmex:

  • Verdict in minutes - not hours
  • Timeline reconstructed automatically
  • Artifacts analyzed (processes, users, commands, files)
  • Remediation plan with ready-to-use commands
  • False positive confirmed - server secure

Myrmex offered to generate a formal PDF report for auditing purposes.


Prompt Variations

The same type of investigation can be adapted:

For malware analysis:

Analyze process PID 1234 on @ANX-SRV-01.
Verify if it is malware, which file originated it, and what connections it is making.

To investigate suspicious login:

Investigate login attempts on @ANX-SRV-01 in the last 24 hours. Identify source IPs, target users, and if there was success.

To check for backdoors:

Check if there are backdoors or rootkits on @ANX-SRV-01 using rkhunter and chkrootkit.

Need to investigate a security incident? Try Myrmex and let AI perform forensic analysis in minutes.

MYRMEX | Incident Response on Ubuntu: Real-Time Forensic Analysis with AI