URL:

https://ddres.ssacentralhelp.ru/

Full analysis: https://app.any.run/tasks/1ce39b40-2eea-42e6-b129-68ccf7d7ffa7
Verdict: Malicious activity
Analysis date: December 29, 2024, 22:22:14
OS: Ubuntu 22.04.2 LTS
Tags:
phishing
Indicators:
MD5:

277405C1D9734B870C837CEBBA0D1997

SHA1:

5832B6430892AC39B52A7530CF568BADA1C8854E

SHA256:

16FCE535F0C1535E9AE2D88B159FEFDB210B24637EEB5E9294D32518F13F4D8C

SSDEEP:

3:N8ZQMRYlX9Pfn:21RYj

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • PHISHING has been detected (SURICATA)

      • systemd-resolved (PID: 445)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
388
Monitored processes
181
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start dash no specs sudo no specs snap no specs locale-check no specs snap-seccomp no specs snap-confine no specs dumpe2fs no specs snap-update-ns no specs dumpe2fs no specs snap-update-ns no specs date no specs chmod no specs bash no specs cat no specs bash no specs cat no specs md5sum no specs md5sum no specs grep no specs snapctl no specs snapctl no specs mkdir no specs realpath no specs realpath no specs xdg-user-dirs-update no specs bash no specs bash no specs bash no specs realpath no specs realpath no specs realpath no specs bash no specs bash no specs realpath no specs realpath no specs bash no specs bash no specs bash no specs realpath no specs realpath no specs realpath no specs ln no specs mkdir no specs ln no specs rm no specs ln no specs firefox no specs snapctl no specs snapctl no specs glxtest no specs snap no specs firefox no specs firefox no specs systemd-timedated no specs systemctl no specs systemctl no specs firefox no specs firefox no specs systemctl no specs systemctl no specs bash no specs dbus-send no specs cut no specs dbus-daemon no specs snap no specs dash no specs dash no specs dash no specs basename no specs dash no specs grep no specs cut no specs dash no specs dash no specs readlink no specs dash no specs dash no specs dash no specs dash no specs dash no specs dash no specs dash no specs dash no specs tr no specs dash no specs tr no specs mawk no specs cut no specs basename no specs dash no specs dash no specs readlink no specs grep no specs cut no specs dash no specs firefox no specs firefox no specs firefox no specs firefox no specs #PHISHING systemd-resolved firefox no specs firefox no specs bash no specs dbus-send no specs cut no specs dash no specs dash no specs dash no specs basename no specs dash no specs dash no specs readlink no specs dash no specs grep no specs cut no specs dash no specs dash no specs dash no specs dash no specs dash no specs dash no specs dash no specs dash no specs tr no specs dash no specs tr no specs mawk no specs cut no specs basename no specs dash no specs dash no specs readlink no specs grep no specs cut no specs dash no specs firefox no specs firefox no specs firefox no specs firefox no specs firefox no specs firefox no specs firefox no specs firefox no specs firefox no specs bash no specs dbus-send no specs cut no specs dash no specs dash no specs dash no specs basename no specs dash no specs grep no specs cut no specs dash no specs dash no specs readlink no specs dash no specs dash no specs dash no specs dash no specs dash no specs dash no specs dash no specs dash no specs tr no specs dash no specs tr no specs mawk no specs cut no specs basename no specs dash no specs grep no specs cut no specs dash no specs dash no specs readlink no specs firefox no specs firefox no specs firefox no specs firefox no specs

Process information

PID
CMD
Path
Indicators
Parent process
445/lib/systemd/systemd-resolved/usr/lib/systemd/systemd-resolved
systemd
User:
systemd-resolve
Integrity Level:
UNKNOWN
38748/bin/sh -c "DISPLAY=:0 sudo -iu user firefox https://ddres\.ssacentralhelp\.ru/ "/usr/bin/dashany-guest-agent
User:
root
Integrity Level:
UNKNOWN
38749sudo -iu user firefox https://ddres.ssacentralhelp.ru//usr/bin/sudodash
User:
root
Integrity Level:
UNKNOWN
38750firefox https://ddres.ssacentralhelp.ru//snap/snapd/20290/usr/bin/snapsudo
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
38751/usr/bin/locale-check C.UTF-8/usr/bin/locale-checksnap
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
38763/snap/snapd/20290/usr/lib/snapd/snap-seccomp version-info/snap/snapd/20290/usr/lib/snapd/snap-seccompsnap
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
38770/snap/snapd/20290/usr/lib/snapd/snap-confine --base core22 snap.firefox.firefox /usr/lib/snapd/snap-exec firefox https://ddres.ssacentralhelp.ru//snap/snapd/20290/usr/lib/snapd/snap-confine
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
38771dumpe2fs -h /dev/sda3/usr/sbin/dumpe2fsudisksd
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
38772snap-update-ns --from-snap-confine firefox/snap/snapd/20290/usr/lib/snapd/snap-update-ns
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
38778dumpe2fs -h /dev/sda3/usr/sbin/dumpe2fsudisksd
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
25
TCP/UDP connections
62
DNS requests
106
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
488
NetworkManager
GET
204
185.125.190.48:80
http://connectivity-check.ubuntu.com/
unknown
whitelisted
GET
200
34.107.221.82:80
http://detectportal.firefox.com/canonical.html
unknown
whitelisted
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
unknown
whitelisted
POST
200
95.101.54.107:80
http://r11.o.lencr.org/
unknown
whitelisted
POST
200
142.250.181.227:80
http://o.pki.goog/s/wr3/jLM
unknown
whitelisted
POST
200
95.101.54.131:80
http://r10.o.lencr.org/
unknown
whitelisted
POST
200
142.250.181.227:80
http://o.pki.goog/wr2
unknown
whitelisted
POST
200
95.101.54.131:80
http://r10.o.lencr.org/
unknown
whitelisted
POST
200
142.250.181.227:80
http://o.pki.goog/wr2
unknown
whitelisted
POST
200
95.101.54.107:80
http://r11.o.lencr.org/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
484
avahi-daemon
224.0.0.251:5353
unknown
185.125.190.97:80
Canonical Group Limited
GB
unknown
488
NetworkManager
185.125.190.48:80
Canonical Group Limited
GB
unknown
1178
snap-store
169.150.255.183:443
odrs.gnome.org
GB
whitelisted
512
snapd
185.125.188.55:443
api.snapcraft.io
Canonical Group Limited
GB
whitelisted
512
snapd
185.125.188.58:443
api.snapcraft.io
Canonical Group Limited
GB
whitelisted
34.117.188.166:443
contile.services.mozilla.com
whitelisted
172.67.179.146:443
ddres.ssacentralhelp.ru
CLOUDFLARENET
US
unknown
34.107.221.82:80
detectportal.firefox.com
GOOGLE
US
whitelisted
95.101.54.107:80
r11.o.lencr.org
Akamai International B.V.
DE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.212.174
  • 2a00:1450:4001:802::200e
whitelisted
odrs.gnome.org
  • 169.150.255.183
  • 195.181.175.41
  • 169.150.255.180
  • 212.102.56.178
  • 195.181.170.18
  • 37.19.194.81
  • 207.211.211.27
  • 2a02:6ea0:c700::11
  • 2a02:6ea0:c700::112
  • 2a02:6ea0:c700::101
  • 2a02:6ea0:c700::107
  • 2a02:6ea0:c700::19
  • 2a02:6ea0:c700::18
  • 2a02:6ea0:c700::21
whitelisted
api.snapcraft.io
  • 185.125.188.55
  • 185.125.188.54
  • 185.125.188.58
  • 185.125.188.59
  • 2620:2d:4000:1010::117
  • 2620:2d:4000:1010::42
  • 2620:2d:4000:1010::2e6
  • 2620:2d:4000:1010::6d
whitelisted
ddres.ssacentralhelp.ru
  • 172.67.179.146
  • 104.21.35.207
  • 2606:4700:3032::ac43:b392
  • 2606:4700:3037::6815:23cf
unknown
detectportal.firefox.com
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted
example.org
  • 93.184.215.14
  • 2606:2800:21f:cb07:6820:80da:af6b:8b2c
whitelisted
ipv4only.arpa
  • 192.0.0.171
  • 192.0.0.170
whitelisted
contile.services.mozilla.com
  • 34.117.188.166
whitelisted
spocs.getpocket.com
  • 34.117.188.166
whitelisted
prod.ads.prod.webservices.mozgcp.net
whitelisted

Threats

PID
Process
Class
Message
445
systemd-resolved
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Suspected Phishing domain by CrossDomain ( .ssacentralhelp .ru)
445
systemd-resolved
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Suspected Phishing domain by CrossDomain ( .ssacentralhelp .ru)
No debug info