URL:

http://213.209.143.44/netgear.sh

Full analysis: https://app.any.run/tasks/821ac365-8964-465a-ac24-2c9f77105d43
Verdict: Malicious activity
Analysis date: May 15, 2025, 15:12:27
OS: Ubuntu 22.04.2
Tags:
scan
ssh
sshscan
Indicators:
MD5:

7236D5F085CBBC78EDEF39506EA88667

SHA1:

9E1199EE78417CAEBC46C94F0BC1560D4EA662B0

SHA256:

416D3ECAF4D3FE23477EC5CA0CC865F7F2AE15EC099506227267659F0F6750CE

SSDEEP:

3:N1K8ygh70n:C85F0

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Attempting to scan the network

      • x86 (deleted) (PID: 41294)
    • Attempting to connect via SSH

      • x86 (deleted) (PID: 41294)
    • SSHSCAN has been detected (SURICATA)

      • x86 (deleted) (PID: 41294)
  • SUSPICIOUS

    • Executes commands using command-line interpreter

      • sudo (PID: 40659)
      • gnome-terminal-server (PID: 41172)
      • firefox (PID: 40660)
      • gnome-terminal-server (PID: 41312)
      • gnome-terminal-server (PID: 41344)
    • Check the Environment Variables Related to System Identification (os-release)

      • snapctl (PID: 40719)
      • snapctl (PID: 40760)
      • snapctl (PID: 40712)
      • snapctl (PID: 40754)
    • Reads passwd file

      • dumpe2fs (PID: 40682)
      • dumpe2fs (PID: 40691)
      • ibus-daemon (PID: 41255)
      • ibus-daemon (PID: 41263)
      • ibus-daemon (PID: 41268)
      • ibus-daemon (PID: 41297)
      • ibus-daemon (PID: 41304)
    • Creates shell script file

      • firefox (PID: 40660)
    • Executes the "rm" command to delete files or directories

      • bash (PID: 41206)
    • Uses wget to download content

      • bash (PID: 41206)
    • Reads /proc/mounts (likely used to find writable filesystems)

      • x86 (deleted) (PID: 41236)
    • Potential Corporate Privacy Violation

      • wget (PID: 41208)
      • wget (PID: 41213)
      • wget (PID: 41218)
      • wget (PID: 41232)
      • wget (PID: 41227)
      • x86 (deleted) (PID: 41294)
    • Connects to the server without a host name

      • wget (PID: 41227)
      • wget (PID: 41218)
      • wget (PID: 41208)
      • wget (PID: 41213)
      • wget (PID: 41232)
      • x86 (deleted) (PID: 41235)
    • Connects to unusual port

      • x86 (deleted) (PID: 41235)
  • INFO

    • Checks timezone

      • dumpe2fs (PID: 40691)
      • wget (PID: 41208)
      • dumpe2fs (PID: 40682)
      • wget (PID: 41218)
      • python3.10 (PID: 41165)
      • wget (PID: 41213)
      • wget (PID: 41227)
      • wget (PID: 41223)
      • wget (PID: 41232)
      • python3.10 (PID: 41305)
      • python3.10 (PID: 41337)
    • Creates file in the temporary folder

      • wget (PID: 41213)
      • wget (PID: 41218)
      • wget (PID: 41208)
      • wget (PID: 41227)
      • wget (PID: 41232)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
477
Monitored processes
257
Malicious processes
5
Suspicious processes
7

Behavior graph

Click at the process to see the details
start dash no specs sudo no specs firefox locale-check no specs snap-seccomp no specs systemctl no specs snap-confine no specs dumpe2fs no specs snap-update-ns no specs systemctl no specs dumpe2fs no specs snap-update-ns no specs date no specs chmod no specs bash no specs cat no specs md5sum no specs bash no specs cat no specs grep no specs md5sum no specs snapctl no specs systemctl no specs snapctl no specs systemctl no specs mkdir no specs realpath no specs realpath no specs xdg-user-dirs-update no specs bash no specs realpath no specs bash no specs realpath no specs bash no specs bash no specs bash no specs realpath no specs realpath no specs realpath no specs bash no specs bash no specs bash no specs realpath no specs realpath no specs realpath no specs ln no specs mkdir no specs ln no specs rm no specs ln no specs firefox no specs snapctl no specs snapctl no specs glxtest no specs snap no specs firefox no specs firefox no specs systemd-timedated no specs firefox no specs firefox no specs bash no specs dbus-send no specs cut no specs dbus-daemon no specs snap no specs dash no specs dash no specs dash no specs dash no specs basename no specs dash no specs dash no specs readlink no specs dash no specs grep no specs cut no specs dash no specs dash no specs dash no specs dash no specs dash no specs dash no specs dash no specs tr no specs dash no specs tr no specs mawk no specs cut no specs basename no specs dash no specs dash no specs readlink no specs grep no specs cut no specs dash no specs tracker-extract-3 no specs firefox no specs firefox no specs bash no specs dbus-send no specs cut no specs dash no specs dash no specs dash no specs dash no specs basename no specs dash no specs dash no specs readlink no specs dash no specs grep no specs cut no specs dash no specs dash no specs dash no specs dash no specs dash no specs dash no specs dash no specs tr no specs dash no specs tr no specs mawk no specs cut no specs basename no specs dash no specs dash no specs readlink no specs grep no specs cut no specs dash no specs firefox no specs firefox no specs firefox no specs firefox no specs firefox no specs firefox no specs firefox no specs firefox no specs firefox no specs bash no specs dbus-send no specs cut no specs dash no specs dash no specs dash no specs dash no specs basename no specs dash no specs dash no specs readlink no specs dash no specs grep no specs cut no specs dash no specs dash no specs dash no specs dash no specs dash no specs dash no specs dash no specs tr no specs dash no specs tr no specs mawk no specs cut no specs basename no specs dash no specs grep no specs cut no specs dash no specs dash no specs readlink no specs python3.10 no specs gnome-terminal.real no specs gnome-terminal-server no specs bash no specs dash no specs dircolors no specs basename no specs dash no specs dirname no specs ls no specs bash no specs bash no specs ls no specs bash no specs bash no specs chmod no specs bash no specs rm no specs wget chmod no specs bash no specs rm no specs wget chmod no specs bash no specs rm no specs wget chmod no specs bash no specs rm no specs wget chmod no specs bash no specs rm no specs wget chmod no specs bash no specs rm no specs wget chmod no specs x86 no specs x86 (deleted) x86 (deleted) no specs dash no specs dash no specs ibus-daemon no specs ibus-dconf no specs ibus-daemon no specs dash no specs dash no specs ibus-daemon no specs dash no specs dash no specs ibus-daemon no specs ibus-dconf no specs ibus-extension-gtk3 no specs dbus-daemon no specs ibus-portal no specs #SSHSCAN x86 (deleted) dash no specs dash no specs ibus-daemon no specs ibus-dconf no specs dash no specs dash no specs ibus-daemon no specs python3.10 no specs gnome-terminal.real no specs gnome-terminal-server no specs bash no specs dash no specs dircolors no specs basename no specs dash no specs dirname no specs python3.10 no specs gnome-terminal.real no specs gnome-terminal-server no specs bash no specs dash no specs basename no specs dash no specs dircolors no specs dirname no specs

Process information

PID
CMD
Path
Indicators
Parent process
40658/bin/sh -c "DISPLAY=:0 sudo -iu user firefox http://213\.209\.143\.44/netgear\.sh "/usr/bin/dashany-guest-agent
User:
root
Integrity Level:
UNKNOWN
Exit code:
35072
40659sudo -iu user firefox http://213.209.143.44/netgear.sh/usr/bin/sudodash
User:
root
Integrity Level:
UNKNOWN
Exit code:
9
40660/snap/firefox/3358/usr/lib/firefox/firefox http://213.209.143.44/netgear.sh/snap/firefox/3358/usr/lib/firefox/firefox
sudo
User:
user
Integrity Level:
UNKNOWN
Exit code:
9
40661/usr/bin/locale-check C.UTF-8/usr/bin/locale-checkfirefox
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
40672/snap/snapd/20290/usr/lib/snapd/snap-seccomp version-info/snap/snapd/20290/usr/lib/snapd/snap-seccompfirefox
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
40679systemctl --user --global is-enabled snap.snapd-desktop-integration.snapd-desktop-integration.service/usr/bin/systemctlsnapd
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
40681/snap/snapd/20290/usr/lib/snapd/snap-confine --base core22 snap.firefox.firefox /usr/lib/snapd/snap-exec firefox http://213.209.143.44/netgear.sh/snap/snapd/20290/usr/lib/snapd/snap-confinefirefox
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
40682dumpe2fs -h /dev/sda3/usr/sbin/dumpe2fsudisksd
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
40683snap-update-ns --from-snap-confine firefox/snap/snapd/20290/usr/lib/snapd/snap-update-nsfirefox
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
40690systemctl --user --global is-enabled snap.snapd-desktop-integration.snapd-desktop-integration.service/usr/bin/systemctlsnapd
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
Executable files
0
Suspicious files
5
Text files
6
Unknown types
0

Dropped files

PID
Process
Filename
Type
41208wget/tmp/mipsbinary
MD5:
SHA256:
41213wget/tmp/mipselbinary
MD5:
SHA256:
41218wget/tmp/arm5binary
MD5:
SHA256:
41227wget/tmp/arm7binary
MD5:
SHA256:
41232wget/tmp/x86 (deleted)binary
MD5:
SHA256:
41255ibus-daemon/home/user/.config/ibus/bus/b82edf789d4944789b773e6aeadf24e8-unix-wayland-0text
MD5:
SHA256:
41255ibus-daemon/home/user/.config/ibus/bus/b82edf789d4944789b773e6aeadf24e8-unix-0text
MD5:
SHA256:
41268ibus-daemon/home/user/.config/ibus/bus/b82edf789d4944789b773e6aeadf24e8-unix-wayland-0 (deleted)text
MD5:
SHA256:
41268ibus-daemon/home/user/.config/ibus/bus/b82edf789d4944789b773e6aeadf24e8-unix-0 (deleted)text
MD5:
SHA256:
41297ibus-daemon/home/user/.config/ibus/bus/b82edf789d4944789b773e6aeadf24e8-unix-wayland-0text
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
25
TCP/UDP connections
3 609
DNS requests
68
Threats
12

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
204
185.125.190.96:80
http://connectivity-check.ubuntu.com/
unknown
whitelisted
40660
firefox
GET
200
34.107.221.82:80
http://detectportal.firefox.com/canonical.html
unknown
whitelisted
40660
firefox
GET
200
213.209.143.44:80
http://213.209.143.44/netgear.sh
unknown
malicious
40660
firefox
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
unknown
whitelisted
40660
firefox
POST
200
184.24.77.67:80
http://r11.o.lencr.org/
unknown
whitelisted
40660
firefox
POST
200
142.250.185.99:80
http://o.pki.goog/s/wr3/FIY
unknown
whitelisted
40660
firefox
POST
200
184.24.77.67:80
http://r11.o.lencr.org/
unknown
whitelisted
40660
firefox
POST
200
142.250.185.99:80
http://o.pki.goog/we2
unknown
whitelisted
40660
firefox
POST
200
142.250.185.99:80
http://o.pki.goog/we2
unknown
whitelisted
40660
firefox
POST
200
142.250.185.99:80
http://o.pki.goog/we2
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
185.125.190.18:80
connectivity-check.ubuntu.com
Canonical Group Limited
GB
whitelisted
185.125.190.96:80
connectivity-check.ubuntu.com
Canonical Group Limited
GB
whitelisted
484
avahi-daemon
224.0.0.251:5353
unknown
195.181.175.40:443
odrs.gnome.org
Datacamp Limited
DE
whitelisted
512
snapd
185.125.188.57:443
api.snapcraft.io
Canonical Group Limited
GB
whitelisted
40660
firefox
213.209.143.44:80
ilovefent.anondns.net
Moon Dc
DE
malicious
40660
firefox
34.107.221.82:80
detectportal.firefox.com
GOOGLE
US
whitelisted
40660
firefox
142.250.185.106:443
safebrowsing.googleapis.com
whitelisted
40660
firefox
142.250.185.206:443
sb-ssl.google.com
whitelisted
40660
firefox
34.36.137.203:443
contile.services.mozilla.com
whitelisted

DNS requests

Domain
IP
Reputation
connectivity-check.ubuntu.com
  • 2620:2d:4000:1::97
  • 2001:67c:1562::24
  • 2001:67c:1562::23
  • 2620:2d:4000:1::23
  • 2620:2d:4000:1::2a
  • 2620:2d:4000:1::98
  • 2620:2d:4000:1::96
  • 2620:2d:4000:1::2b
  • 2620:2d:4000:1::22
  • 2620:2d:4002:1::196
  • 2620:2d:4002:1::198
  • 185.125.190.96
  • 91.189.91.48
  • 185.125.190.97
  • 91.189.91.98
  • 185.125.190.18
  • 91.189.91.49
  • 185.125.190.48
  • 185.125.190.17
  • 185.125.190.49
  • 185.125.190.98
  • 91.189.91.96
whitelisted
google.com
  • 142.250.186.142
  • 2a00:1450:4001:82a::200e
whitelisted
odrs.gnome.org
  • 195.181.175.40
  • 195.181.170.18
  • 212.102.56.179
  • 169.150.255.184
  • 37.19.194.81
  • 169.150.255.181
  • 207.211.211.27
  • 2a02:6ea0:c700::112
  • 2a02:6ea0:c700::21
  • 2a02:6ea0:c700::19
  • 2a02:6ea0:c700::11
  • 2a02:6ea0:c700::107
  • 2a02:6ea0:c700::101
  • 2a02:6ea0:c700::18
whitelisted
api.snapcraft.io
  • 185.125.188.57
  • 185.125.188.58
  • 185.125.188.54
  • 185.125.188.59
  • 2620:2d:4000:1010::42
  • 2620:2d:4000:1010::344
  • 2620:2d:4000:1010::117
  • 2620:2d:4000:1010::2e6
whitelisted
detectportal.firefox.com
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted
example.org
  • 23.215.0.132
  • 96.7.128.192
  • 96.7.128.186
  • 23.215.0.133
  • 2600:1406:bc00:17::6007:8128
  • 2600:1408:ec00:36::1736:7f2f
  • 2600:1408:ec00:36::1736:7f2e
  • 2600:1406:bc00:17::6007:810d
whitelisted
ipv4only.arpa
  • 192.0.0.171
  • 192.0.0.170
whitelisted
contile.services.mozilla.com
  • 34.36.137.203
whitelisted
spocs.getpocket.com
  • 34.36.137.203
whitelisted
mc.prod.ads.prod.webservices.mozgcp.net
whitelisted

Threats

PID
Process
Class
Message
41218
wget
Potential Corporate Privacy Violation
ET INFO Executable and linking format (ELF) file download Over HTTP
41208
wget
Potential Corporate Privacy Violation
ET INFO Executable and linking format (ELF) file download Over HTTP
41213
wget
Potential Corporate Privacy Violation
ET INFO Executable and linking format (ELF) file download Over HTTP
41227
wget
Potential Corporate Privacy Violation
ET INFO Executable and linking format (ELF) file download Over HTTP
41232
wget
Potential Corporate Privacy Violation
ET INFO Executable and linking format (ELF) file download Over HTTP
41294
x86 (deleted)
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Attempting to SSH scan external network
41294
x86 (deleted)
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Attempting to SSH scan external network
41294
x86 (deleted)
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Attempting to SSH scan external network
41294
x86 (deleted)
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Attempting to SSH scan external network
41294
x86 (deleted)
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Attempting to SSH scan external network
No debug info