| File name: | linux_386 |
| Full analysis: | https://app.any.run/tasks/1ae6960a-dfda-448a-928a-46a8c5fb5997 |
| Verdict: | Malicious activity |
| Threats: | BlackMoon also known as KrBanker is a trojan aimed at stealing payment credentials. It specializes in man-in-the-browser (MitB) attacks, web injection, and credential theft to compromise users' online banking accounts. It was first noticed in early 2014 attacking banks in South Korea and has impressively evolved since by adding a number of new infiltration techniques and information stealing methods. |
| Analysis date: | April 20, 2025, 13:04:40 |
| OS: | Ubuntu 22.04.2 |
| Tags: | |
| Indicators: | |
| MIME: | application/x-executable |
| File info: | ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, Go BuildID=IImgmtcOXzdAKGDkMtfv/dYhp8Lglk61wqJMshAII/fHZEBw5jKDR1FJEWwRoG/MdzxbdmuQwsJBwdbTm09, stripped |
| MD5: | F50B701A4D4F21AEE1F382065DDBB519 |
| SHA1: | E2C151946009BD0BB9ACAC03C78628A7F295A66F |
| SHA256: | 1C1A71735E1D19CFB2149CD99596FDBC44A90A5C229413F710B65EE1A0942C0B |
| SSDEEP: | 49152:IAFemr6ikAqVgaG7EQsx1IFCdxfpaA6xL+TJo:3qVgaGK1S0 |
| .o | | | ELF Executable and Linkable format (generic) (49.8) |
|---|
| CPUArchitecture: | 32 bit |
|---|---|
| CPUByteOrder: | Little endian |
| ObjectFileType: | Executable file |
| CPUType: | i386 |
PID | CMD | Path | Indicators | Parent process |
|---|---|---|---|---|
| 39490 | /bin/sh -c "sudo chown user /tmp/linux_386\.elf && chmod +x /tmp/linux_386\.elf && DISPLAY=:0 sudo -iu user /tmp/linux_386\.elf " | /usr/bin/dash | — | any-guest-agent |
User: root Integrity Level: UNKNOWN Exit code: 0 | ||||
| 39491 | sudo chown user /tmp/linux_386.elf | /usr/bin/sudo | — | dash |
User: root Integrity Level: UNKNOWN Exit code: 0 | ||||
| 39492 | chown user /tmp/linux_386.elf | /usr/bin/chown | — | sudo |
User: root Integrity Level: UNKNOWN Exit code: 0 | ||||
| 39493 | chmod +x /tmp/linux_386.elf | /usr/bin/chmod | — | dash |
User: root Integrity Level: UNKNOWN Exit code: 0 | ||||
| 39494 | sudo -iu user /tmp/linux_386.elf | /usr/bin/sudo | — | dash |
User: root Integrity Level: UNKNOWN Exit code: 0 | ||||
| 39495 | systemctl --user --global is-enabled snap.snapd-desktop-integration.snapd-desktop-integration.service | /usr/bin/systemctl | — | snapd |
User: root Integrity Level: UNKNOWN Exit code: 0 | ||||
| 39496 | /tmp/linux_386.elf | /tmp/linux_386.elf | — | sudo |
User: user Integrity Level: UNKNOWN Exit code: 0 | ||||
| 39497 | /usr/bin/locale-check C.UTF-8 | /usr/bin/locale-check | — | linux_386.elf |
User: user Integrity Level: UNKNOWN Exit code: 0 | ||||
| 39502 | /tmp/linux_386.elf | /tmp/linux_386.elf | linux_386.elf | |
User: user Integrity Level: UNKNOWN | ||||
| 39507 | /bin/bash -c /etc/32676& | /usr/bin/bash | — | linux_386.elf |
User: user Integrity Level: UNKNOWN Exit code: 0 | ||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 39502 | linux_386.elf | /tmp/.walk | text | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 204 | 91.189.91.49:80 | http://connectivity-check.ubuntu.com/ | unknown | — | — | whitelisted |
— | — | GET | 204 | 91.189.91.49:80 | http://connectivity-check.ubuntu.com/ | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
484 | avahi-daemon | 224.0.0.251:5353 | — | — | — | unknown |
— | — | 91.189.91.49:80 | connectivity-check.ubuntu.com | Canonical Group Limited | US | whitelisted |
— | — | 212.102.56.178:443 | odrs.gnome.org | Datacamp Limited | DE | whitelisted |
512 | snapd | 185.125.188.59:443 | api.snapcraft.io | Canonical Group Limited | GB | whitelisted |
512 | snapd | 185.125.188.55:443 | api.snapcraft.io | Canonical Group Limited | GB | whitelisted |
512 | snapd | 185.125.188.54:443 | api.snapcraft.io | Canonical Group Limited | GB | whitelisted |
39502 | linux_386.elf | 154.201.91.52:888 | — | PEGTECHINC | US | malicious |
Domain | IP | Reputation |
|---|---|---|
connectivity-check.ubuntu.com |
| whitelisted |
google.com |
| whitelisted |
odrs.gnome.org |
| whitelisted |
api.snapcraft.io |
| whitelisted |
www.google.com |
| whitelisted |
4.100.168.192.in-addr.arpa |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
39502 | linux_386.elf | A Network Trojan was detected | MALWARE [ANY.RUN] BlackSquare (BlackMoon) |
39502 | linux_386.elf | A Network Trojan was detected | MALWARE [ANY.RUN] BlackSquare (BlackMoon) |