analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

314c86d10ca98a0bb8f424c583985ad2bffa4a12ce72a7f9e56c2d4d42096bc4.elf

Full analysis: https://app.any.run/tasks/91de09d9-365f-471f-97a0-b1599885d977
Verdict: Malicious activity
Threats:

A botnet is a group of internet-connected devices that are controlled by a single individual or group, often without the knowledge or consent of the device owners. These devices can be used to launch a variety of malicious attacks, such as distributed denial-of-service (DDoS) attacks, spam campaigns, and data theft. Botnet malware is the software that is used to infect devices and turn them into part of a botnet.

Analysis date: May 01, 2024, 08:14:55
OS: Ubuntu 22.04.2
Tags:
mirai
botnet
MIME: application/x-executable
File info: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
MD5:

7B2FB9CAC8B5C666B7A3190E53F4BF98

SHA1:

6FD296E296F522A1C5262029618801DF542959F5

SHA256:

314C86D10CA98A0BB8F424C583985AD2BFFA4A12CE72A7F9E56C2D4D42096BC4

SSDEEP:

3072:aH+z/tq86X1YlxXUiQYQy7SQnTuCfRLxJViymbp:aH+z/tq86X1YlxXBQYQy7SQnyCfRUymd

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads /proc/mounts (likely used to find writable filesystems)

      • fusermount3 (PID: 9284)
      • fusermount3 (PID: 9289)
      • dbus-daemon (PID: 9309)
      • fusermount3 (PID: 9290)
    • Modifies file or directory owner

      • sudo (PID: 9258)
    • Checks DMI information (probably VM detection)

      • udevadm (PID: 9287)
      • pipewire (PID: 9310)
      • systemd-hostnamed (PID: 9274)
      • pulseaudio (PID: 9312)
    • Executes commands using command-line interpreter

      • cron (PID: 9729)
    • Checks the user who created the process

      • systemd (PID: 9323)
      • cron (PID: 9729)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.o | ELF Executable and Linkable format (generic) (100)

EXIF

EXE

CPUType: AMD x86-64
ObjectFileType: Executable file
CPUByteOrder: Little endian
CPUArchitecture: 64 bit
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
292
Monitored processes
71
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start sh no specs sudo no specs chown no specs chmod no specs sudo no specs 314c86d10ca98a0bb8f424c583985ad2bffa4a12ce72a7f9e56c2d4d42096bc4.elf.o no specs locale-check no specs 314c86d10ca98a0bb8f424c583985ad2bffa4a12ce72a7f9e56c2d4d42096bc4.elf.o no specs gnome-session-ctl no specs gsd-rfkill no specs systemd-hostnamed no specs gnome-session-ctl no specs fusermount3 no specs gnome-session-ctl no specs udevadm no specs gnome-session-failed no specs fusermount3 no specs fusermount3 no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs sh no specs gnome-session-ctl no specs systemctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs dbus-daemon no specs pipewire no specs pipewire-media-session no specs pulseaudio no specs gnome-session-ctl no specs default no specs gdm-session-worker no specs default no specs default no specs systemd-user-runtime-dir no specs systemd no specs gnome-session-binary no specs gvfsd no specs snap-confine no specs gvfsd-fuse no specs snap-confine no specs 5 no specs unity-gnome-shell-migration.17.10.py no specs gvfs-mtp-volume-monitor no specs dbus-daemon no specs dbus-daemon no specs systemd-localed no specs systemd no specs dbus-daemon no specs dbus-daemon no specs gjs no specs dbus-daemon no specs gsd-a11y-settings no specs gsd-housekeeping no specs gsd-power no specs dbus-daemon no specs ibus-engine-m17n no specs dbus-daemon no specs ibus-engine-unikey no specs ibus-engine-simple no specs cron no specs sh no specs run-parts no specs

Process information

PID
CMD
Path
Indicators
Parent process
9257/bin/sh -c "sudo chown user /tmp/314c86d10ca98a0bb8f424c583985ad2bffa4a12ce72a7f9e56c2d4d42096bc4\.elf\.o && chmod +x /tmp/314c86d10ca98a0bb8f424c583985ad2bffa4a12ce72a7f9e56c2d4d42096bc4\.elf\.o && DISPLAY=:0 sudo -iu user /tmp/314c86d10ca98a0bb8f424c583985ad2bffa4a12ce72a7f9e56c2d4d42096bc4\.elf\.o "/bin/shany-guest-agent
User:
root
Integrity Level:
UNKNOWN
9258sudo chown user /tmp/314c86d10ca98a0bb8f424c583985ad2bffa4a12ce72a7f9e56c2d4d42096bc4.elf.o/usr/bin/sudosh
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
9259chown user /tmp/314c86d10ca98a0bb8f424c583985ad2bffa4a12ce72a7f9e56c2d4d42096bc4.elf.o/usr/bin/chownsudo
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
9260chmod +x /tmp/314c86d10ca98a0bb8f424c583985ad2bffa4a12ce72a7f9e56c2d4d42096bc4.elf.o/usr/bin/chmodsh
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
9261sudo -iu user /tmp/314c86d10ca98a0bb8f424c583985ad2bffa4a12ce72a7f9e56c2d4d42096bc4.elf.o/usr/bin/sudosh
User:
root
Integrity Level:
UNKNOWN
9262/tmp/314c86d10ca98a0bb8f424c583985ad2bffa4a12ce72a7f9e56c2d4d42096bc4.elf.o/tmp/314c86d10ca98a0bb8f424c583985ad2bffa4a12ce72a7f9e56c2d4d42096bc4.elf.osudo
User:
user
Integrity Level:
UNKNOWN
9263/usr/bin/locale-check C.UTF-8/usr/bin/locale-check314c86d10ca98a0bb8f424c583985ad2bffa4a12ce72a7f9e56c2d4d42096bc4.elf.o
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
9264httpd 14c86d10ca98a0bb8f424c583985ad2bffa4a12ce72a7f9e56c2d4d42096bc4.elf.o/tmp/314c86d10ca98a0bb8f424c583985ad2bffa4a12ce72a7f9e56c2d4d42096bc4.elf.o314c86d10ca98a0bb8f424c583985ad2bffa4a12ce72a7f9e56c2d4d42096bc4.elf.o
User:
user
Integrity Level:
UNKNOWN
9267/usr/libexec/gnome-session-ctl --exec-stop-check/usr/libexec/gnome-session-ctlsystemd
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
9270/usr/libexec/gsd-rfkill/usr/libexec/gsd-rfkillsystemd
User:
user
Integrity Level:
UNKNOWN
Exit code:
496
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
9323systemd/user.slice/user-128.slice/[email protected]/app.slice/cgroup.subtree_control
MD5:
SHA256:
9323systemd/user.slice/user-128.slice/[email protected]/background.slice/cgroup.subtree_control
MD5:
SHA256:
9323systemd/user.slice/user-128.slice/[email protected]/session.slice/cgroup.subtree_control
MD5:
SHA256:
9323systemd/user.slice/user-128.slice/[email protected]/app.slice/dbus.socket/cgroup.subtree_control
MD5:
SHA256:
9323systemd/user.slice/user-128.slice/[email protected]/app.slice/gvfs-mtp-volume-monitor.service/cgroup.subtree_control
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
30
DNS requests
12
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
204
91.189.91.48:80
http://connectivity-check.ubuntu.com/
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
91.189.91.48:80
Canonical Group Limited
US
unknown
185.125.190.18:80
Canonical Group Limited
GB
unknown
185.125.190.96:80
Canonical Group Limited
GB
unknown
156.146.33.141:443
Datacamp Limited
DE
unknown
224.0.0.251:5353
unknown
89.190.156.145:7733
Alsycon B.V.
NL
unknown
94.156.8.76:33966
net.kovey-net.xyz
Vivacom
BG
unknown

DNS requests

Domain
IP
Reputation
net.kovey-net.xyz
  • 94.156.8.76
malicious
85.100.168.192.in-addr.arpa
unknown
connectivity-check.ubuntu.com
  • 2001:67c:1562::23
  • 2620:2d:4002:1::198
  • 2620:2d:4000:1::98
  • 2620:2d:4000:1::96
  • 2620:2d:4000:1::2a
  • 2620:2d:4000:1::2b
  • 2620:2d:4000:1::23
  • 2620:2d:4000:1::22
  • 2620:2d:4000:1::97
  • 2620:2d:4002:1::196
  • 2620:2d:4002:1::197
  • 2001:67c:1562::24
unknown
api.snapcraft.io
  • 185.125.188.59
  • 185.125.188.55
  • 185.125.188.54
  • 185.125.188.58
unknown

Threats

PID
Process
Class
Message
Malware Command and Control Activity Detected
BOTNET [ANY.RUN] Possible Mirai.Gen (Linux)
Malware Command and Control Activity Detected
BOTNET [ANY.RUN] Possible Mirai.Gen (Linux)
No debug info