File name:

x86

Full analysis: https://app.any.run/tasks/875a2fa0-0ce7-4e6e-b330-e683aa83e55b
Verdict: Malicious activity
Analysis date: May 10, 2025, 07:01:33
OS: Ubuntu 22.04.2
Tags:
scan
ssh
sshscan
telnet
Indicators:
MIME: application/x-executable
File info: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
MD5:

CFC9CB1B2740ECEC4F4D56B8BE10354B

SHA1:

D2D714911979971FD10BBF49C9AEFBC2D3CDEDF0

SHA256:

4A113A9F858520AD3DFA772FD30838A2A19855041941B35326A750D4C887089A

SSDEEP:

3072:fqCrAaal+EoLstNYNYHZQnuxaWcFQkLwoMrfxCqPjGAd:fqCrAaal+EoLeNYNYHZQnuxaWcFQkPkv

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Attempting to connect via SSH

      • (PID: 39508)
    • SSHSCAN has been detected (SURICATA)

      • (PID: 39508)
    • Attempting to scan the network

      • (PID: 39508)
  • SUSPICIOUS

    • Reads profile file

      • x86.elf (PID: 39503)
    • Modifies file or directory owner

      • sudo (PID: 39496)
    • Reads passwd file

      • pipewire (PID: 39563)
      • x86.elf (PID: 39503)
      • pipewire-media-session (PID: 39564)
      • gdm-session-worker (PID: 39561)
      • pipewire (PID: 39578)
      • pipewire (PID: 39645)
      • pipewire-media-session (PID: 39655)
      • dbus-daemon (PID: 39671)
      • dbus-daemon (PID: 39613)
      • pipewire (PID: 39708)
      • gnome-shell (PID: 39684)
      • dbus-daemon (PID: 39717)
      • gvfs-udisks2-volume-monitor (PID: 39724)
      • ibus-daemon (PID: 39789)
      • gsd-print-notifications (PID: 39800)
      • gsd-power (PID: 39836)
      • ibus-daemon (PID: 39903)
      • gsd-media-keys (PID: 39822)
      • pipewire-media-session (PID: 39583)
      • dbus-daemon (PID: 39594)
      • pipewire (PID: 39582)
    • Executes commands using command-line interpreter

      • sudo (PID: 39500)
    • Checks DMI information (probably VM detection)

      • pipewire (PID: 39563)
      • pipewire (PID: 39578)
      • pipewire (PID: 39582)
      • pipewire (PID: 39645)
      • pulseaudio (PID: 39584)
      • gnome-shell (PID: 39684)
      • pipewire (PID: 39708)
    • Reads /proc/mounts (likely used to find writable filesystems)

      • dbus-daemon (PID: 39613)
      • dbus-daemon (PID: 39671)
      • dbus-daemon (PID: 39717)
      • gnome-shell (PID: 39684)
      • gjs-console (PID: 39771)
      • gjs-console (PID: 39937)
      • dbus-daemon (PID: 39594)
    • Connects to unusual port

      • (PID: 39505)
    • Check the Environment Variables Related to System Identification (os-release)

      • snap (PID: 39866)
    • Potential Corporate Privacy Violation

      • (PID: 39508)
  • INFO

    • Checks timezone

      • gdm-session-worker (PID: 39561)
      • python3.10 (PID: 39665)
      • dbus-daemon (PID: 39671)
      • python3.10 (PID: 39672)
      • tracker-miner-fs-3 (PID: 39693)
      • gnome-shell (PID: 39684)
      • python3.10 (PID: 39797)
      • gsd-color (PID: 39788)
      • python3.10 (PID: 39907)
      • gsd-print-notifications (PID: 39800)
      • spice-vdagent (PID: 39951)
      • dbus-daemon (PID: 39594)
      • gnome-session-binary (PID: 39617)
    • Creates file in the temporary folder

      • gnome-shell (PID: 39684)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.o | ELF Executable and Linkable format (generic) (49.8)

EXIF

EXE

CPUArchitecture: 32 bit
CPUByteOrder: Little endian
ObjectFileType: Executable file
CPUType: i386
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
394
Monitored processes
174
Malicious processes
5
Suspicious processes
4

Behavior graph

Click at the process to see the details
start systemctl no specs dash no specs sudo no specs chown no specs chmod no specs sudo no specs systemctl no specs systemctl no specs x86.elf no specs locale-check no specs         no specs systemctl no specs #SSHSCAN         no specs gnome-session-ctl no specs dash no specs gnome-session-ctl no specs systemctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs pipewire no specs systemd no specs pulseaudio no specs gnome-session-ctl no specs dash no specs dbus-update-activation-environment no specs gnome-session-ctl no specs dash no specs fusermount3 no specs fusermount3 no specs fusermount3 no specs gdm-session-worker no specs pipewire no specs pipewire-media-session no specs pulseaudio no specs dash no specs dash no specs systemd-user-runtime-dir no specs systemd no specs systemd no specs systemd no specs systemd no specs 30-systemd-environment-d-generator no specs systemd-xdg-autostart-generator no specs pipewire no specs systemd no specs systemctl no specs pulseaudio no specs pipewire no specs pipewire-media-session no specs pulseaudio no specs snap-confine no specs tracker-extract-3 no specs gdm-wayland-session no specs dbus-daemon no specs snap-seccomp no specs dbus-run-session no specs gvfsd no specs dbus-daemon no specs gnome-session-binary no specs gvfsd no specs gvfsd-fuse no specs fusermount3 no specs xdg-document-portal no specs xdg-permission-store no specs gst-plugin-scanner no specs fusermount3 no specs pipewire no specs gst-plugin-scanner no specs session-migration no specs dash no specs gsettings no specs gsettings no specs pipewire-media-session no specs pulseaudio no specs snap-confine no specs snap-confine no specs snap-update-ns no specs python3.10 no specs dbus-daemon no specs python3.10 no specs dash no specs gsettings no specs gsettings no specs gnome-shell no specs tracker-miner-fs-3 no specs pipewire no specs pipewire-media-session no specs pulseaudio no specs dbus-daemon no specs at-spi-bus-launcher no specs dbus-daemon no specs xwayland no specs gvfs-udisks2-volume-monitor no specs gvfs-mtp-volume-monitor no specs gvfs-gphoto2-volume-monitor no specs gvfs-goa-volume-monitor no specs dbus-daemon no specs goa-daemon no specs dbus-daemon no specs goa-identity-service no specs gvfs-afc-volume-monitor no specs systemd-localed no specs dbus-daemon no specs xdg-permission-store no specs geoclue no specs dbus-daemon no specs dbus-daemon no specs gjs-console no specs at-spi2-registryd no specs gsd-sharing no specs gsd-wacom no specs gsd-color no specs ibus-daemon no specs gsd-keyboard no specs python3.10 no specs gsd-print-notifications no specs gsd-rfkill no specs gsd-smartcard no specs gsd-datetime no specs gsd-media-keys no specs gsd-screensaver-proxy no specs gsd-sound no specs gsd-a11y-settings no specs gsd-housekeeping no specs gsd-power no specs systemd-hostnamed no specs dbus-daemon no specs false no specs ibus-engine-m17n no specs snap no specs dash no specs xkbcomp no specs gsd-print-notifications no specs gsd-printer no specs fprintd no specs ibus-daemon no specs dash no specs xkbcomp no specs ibus-engine-mozc no specs python3.10 no specs ibus-engine-unikey no specs dbus-daemon no specs gvfsd no specs ibus-engine-m17n no specs ibus-dconf no specs dbus-daemon no specs ibus-portal no specs ibus-engine-mozc no specs ibus-engine-unikey no specs dbus-daemon no specs gjs-console no specs ibus-dconf no specs ibus-daemon no specs ibus-x11 no specs spice-vdagent no specs dbus-daemon no specs ibus-portal no specs xbrlapi no specs ibus-engine-simple no specs tracker-extract-3 no specs gvfsd-metadata no specs

Process information

PID
CMD
Path
Indicators
Parent process
39494systemctl --user --global is-enabled snap.snapd-desktop-integration.snapd-desktop-integration.service/usr/bin/systemctlsnapd
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
39495/bin/sh -c "sudo chown user /tmp/x86\.elf && chmod +x /tmp/x86\.elf && DISPLAY=:0 sudo -iu user /tmp/x86\.elf "/usr/bin/dashany-guest-agent
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
39496sudo chown user /tmp/x86.elf/usr/bin/sudodash
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
39498chown user /tmp/x86.elf/usr/bin/chownsudo
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
39499chmod +x /tmp/x86.elf/usr/bin/chmoddash
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
39500sudo -iu user /tmp/x86.elf/usr/bin/sudodash
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
39501systemctl --user --global is-enabled snap.snapd-desktop-integration.snapd-desktop-integration.service/usr/bin/systemctlsnapd
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
39502systemctl --user --global is-enabled snap.snapd-desktop-integration.snapd-desktop-integration.service/usr/bin/systemctlsnapd
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
39503/tmp/x86.elf/tmp/x86.elfsudo
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
39504/usr/bin/locale-check C.UTF-8/usr/bin/locale-checkx86.elf
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
Executable files
0
Suspicious files
66
Text files
11
Unknown types
0

Dropped files

PID
Process
Filename
Type
39649session-migration/var/lib/gdm3/.local/share/session_migration-(null)text
MD5:
SHA256:
39584pulseaudio/var/lib/gdm3/.cache/gstreamer-1.0/registry.x86_64.bin (deleted)binary
MD5:
SHA256:
39586tracker-extract-3/var/lib/gdm3/.cache/gstreamer-1.0/registry.x86_64.binbinary
MD5:
SHA256:
39584pulseaudio/var/lib/gdm3/.config/pulse/cookiebinary
MD5:
SHA256:
39693tracker-miner-fs-3/var/lib/gdm3/.cache/tracker3/files/meta.dbbinary
MD5:
SHA256:
39693tracker-miner-fs-3/var/lib/gdm3/.cache/tracker3/files/meta.db-journal (deleted)binary
MD5:
SHA256:
39684gnome-shell/tmp/.X1024-locktext
MD5:
SHA256:
39684gnome-shell/tmp/.X1025-locktext
MD5:
SHA256:
39693tracker-miner-fs-3/var/lib/gdm3/.cache/tracker3/files/ontologies.gvdbbs
MD5:
SHA256:
39693tracker-miner-fs-3/var/lib/gdm3/.cache/tracker3/files/meta.db-shmbinary
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
23 221
DNS requests
11
Threats
97

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
204
185.125.190.48:80
http://connectivity-check.ubuntu.com/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
185.125.190.17:80
Canonical Group Limited
GB
unknown
484
avahi-daemon
224.0.0.251:5353
unknown
169.150.255.180:443
odrs.gnome.org
GB
whitelisted
185.125.190.48:80
Canonical Group Limited
GB
unknown
185.125.188.57:443
api.snapcraft.io
Canonical Group Limited
GB
whitelisted
185.125.188.59:443
api.snapcraft.io
Canonical Group Limited
GB
whitelisted
512
snapd
185.125.188.59:443
api.snapcraft.io
Canonical Group Limited
GB
whitelisted
39508
184.74.163.81:23
TWC-12271-NYC
US
unknown
39508
116.140.73.83:23
CHINA UNICOM China169 Backbone
CN
unknown
39508
16.21.32.185:23
US
unknown

DNS requests

Domain
IP
Reputation
odrs.gnome.org
  • 169.150.255.180
  • 212.102.56.179
  • 37.19.194.80
  • 195.181.175.40
  • 207.211.211.27
  • 169.150.255.183
  • 195.181.170.18
  • 2a02:6ea0:c700::112
  • 2a02:6ea0:c700::11
  • 2a02:6ea0:c700::107
  • 2a02:6ea0:c700::101
  • 2a02:6ea0:c700::21
  • 2a02:6ea0:c700::19
  • 2a02:6ea0:c700::18
whitelisted
google.com
  • 142.250.185.206
  • 2a00:1450:4001:80b::200e
whitelisted
api.snapcraft.io
  • 185.125.188.57
  • 185.125.188.58
  • 185.125.188.59
  • 185.125.188.54
  • 2620:2d:4000:1010::2e6
  • 2620:2d:4000:1010::344
  • 2620:2d:4000:1010::117
  • 2620:2d:4000:1010::42
whitelisted
kittlerer.ru
  • 213.209.143.24
unknown
11.100.168.192.in-addr.arpa
unknown
connectivity-check.ubuntu.com
  • 2620:2d:4000:1::96
  • 2620:2d:4002:1::196
  • 2620:2d:4002:1::198
  • 2620:2d:4000:1::2b
  • 2620:2d:4000:1::98
  • 2001:67c:1562::23
  • 2620:2d:4000:1::22
  • 2001:67c:1562::24
  • 2620:2d:4000:1::97
  • 2620:2d:4000:1::23
  • 2620:2d:4000:1::2a
whitelisted

Threats

PID
Process
Class
Message
A Network Trojan was detected
MALWARE [ANY.RUN] Suspected Domain Associated with Malware Distribution (kittlerer .ru)
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 57
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Attempting to SSH scan external network
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Attempting to SSH scan external network
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Received Telnet Banner
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Received Telnet Banner
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Attempting to SSH scan external network
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Received Telnet Banner
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Received Telnet Banner
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Received Telnet Banner
No debug info