You can also map that socket file descriptor to an actual connection/socket by running (as root): netstat -eepan | grep 2898922 // @hal_pomeranz
Let's investigate a suspicious Linux process to see what files it has open. Malicious processes often have open files that can lead you onto them. Commands: cd /proc/<PID>/fd ls -al #DFIR
2
10
33
Replying to @attrc
I'm also a big fan of lsof, which is available on most Linux distros-- "lsof -p <pid>" or "lsof -c <cmd>"

Jan 4, 2021 · 11:01 PM UTC

2
12