URL:

https://github.com/kid13yt/pc-virus-memz.exe/raw/refs/heads/main/MEMZ.exe

Full analysis: https://app.any.run/tasks/b4871514-5a0d-4a5d-b761-68c89e08cb0d
Verdict: Malicious activity
Analysis date: May 09, 2025, 10:50:33
OS: Ubuntu 22.04.2
Tags:
github
MD5:

CBDF8AE6ECF1A57C8AE763048C921C96

SHA1:

952235DB423355738D023FE899A88F5C882CF7EE

SHA256:

570E27C6BCA3F45A3B9B9CA6CD0E4AABFC55E070AAF564E9A6FF5F388C82009C

SSDEEP:

3:N8tEd+MiWtGDXbAdP7OLNKkL4A:2uoxwIUZ7OLNK2

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads passwd file

      • dumpe2fs (PID: 40697)
      • dumpe2fs (PID: 40688)
    • Check the Environment Variables Related to System Identification (os-release)

      • firefox (PID: 40668)
      • snapctl (PID: 40723)
      • snapctl (PID: 40717)
      • snapctl (PID: 40770)
      • snapctl (PID: 40765)
      • snapctl (PID: 41181)
      • snapctl (PID: 41218)
    • Executes commands using command-line interpreter

      • sudo (PID: 40667)
      • firefox (PID: 40668)
    • Executes the "rm" command to delete files or directories

      • firefox (PID: 40668)
  • INFO

    • Creates file in the temporary folder

      • firefox (PID: 40668)
    • Checks timezone

      • dumpe2fs (PID: 40697)
      • dumpe2fs (PID: 40688)
      • 7z (PID: 41232)
      • file-roller (PID: 41188)
      • 7z (PID: 41201)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
402
Monitored processes
182
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start dash no specs sudo no specs firefox locale-check no specs snap-seccomp no specs snap-confine no specs dumpe2fs no specs snap-update-ns no specs systemctl no specs dumpe2fs no specs snap-update-ns no specs date no specs chmod no specs bash no specs md5sum no specs cat no specs bash no specs cat no specs grep no specs md5sum no specs snapctl no specs snapctl no specs systemctl no specs mkdir no specs realpath no specs realpath no specs xdg-user-dirs-update no specs bash no specs realpath no specs bash no specs bash no specs bash no specs realpath no specs realpath no specs realpath no specs bash no specs bash no specs bash no specs realpath no specs realpath no specs realpath no specs bash no specs realpath no specs ln no specs mkdir no specs ln no specs rm no specs ln no specs firefox no specs systemctl no specs snapctl no specs snapctl no specs systemctl no specs glxtest no specs snap no specs systemctl no specs firefox no specs firefox no specs systemd-timedated no specs firefox no specs firefox no specs bash no specs dbus-send no specs cut no specs dbus-daemon no specs snap no specs dash no specs dash no specs dash no specs dash no specs basename no specs dash no specs dash no specs readlink no specs dash no specs grep no specs cut no specs dash no specs dash no specs dash no specs dash no specs dash no specs dash no specs dash no specs tr no specs dash no specs tr no specs mawk no specs cut no specs basename no specs dash no specs dash no specs readlink no specs grep no specs cut no specs dash no specs firefox no specs firefox no specs tracker-extract-3 no specs bash no specs dbus-send no specs cut no specs dash no specs dash no specs dash no specs dash no specs basename no specs dash no specs dash no specs readlink no specs dash no specs grep no specs cut no specs dash no specs dash no specs dash no specs dash no specs dash no specs dash no specs dash no specs tr no specs dash no specs tr no specs mawk no specs cut no specs basename no specs dash no specs dash no specs readlink no specs grep no specs cut no specs dash no specs firefox no specs firefox no specs firefox no specs firefox no specs firefox no specs firefox no specs firefox no specs firefox no specs firefox no specs bash no specs dbus-send no specs cut no specs dash no specs dash no specs dash no specs basename no specs dash no specs grep no specs cut no specs dash no specs dash no specs readlink no specs dash no specs dash no specs dash no specs dash no specs dash no specs tr no specs dash no specs dash no specs tr no specs dash no specs dash no specs mawk no specs cut no specs basename no specs dash no specs dash no specs readlink no specs grep no specs cut no specs dash no specs snapctl no specs xdg-desktop-portal no specs file-roller no specs 7z no specs snapctl no specs xdg-desktop-portal no specs file-roller no specs 7z no specs

Process information

PID
CMD
Path
Indicators
Parent process
40666/bin/sh -c "DISPLAY=:0 sudo -iu user firefox https://github\.com/kid13yt/pc-virus-memz\.exe/raw/refs/heads/main/MEMZ\.exe "/usr/bin/dashany-guest-agent
User:
root
Integrity Level:
UNKNOWN
40667sudo -iu user firefox https://github.com/kid13yt/pc-virus-memz.exe/raw/refs/heads/main/MEMZ.exe/usr/bin/sudodash
User:
root
Integrity Level:
UNKNOWN
40668/snap/firefox/3358/usr/lib/firefox/firefox https://github.com/kid13yt/pc-virus-memz.exe/raw/refs/heads/main/MEMZ.exe/snap/firefox/3358/usr/lib/firefox/firefox
sudo
User:
user
Integrity Level:
UNKNOWN
40669/usr/bin/locale-check C.UTF-8/usr/bin/locale-checkfirefox
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
40680/snap/snapd/20290/usr/lib/snapd/snap-seccomp version-info/snap/snapd/20290/usr/lib/snapd/snap-seccompfirefox
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
40686/snap/snapd/20290/usr/lib/snapd/snap-confine --base core22 snap.firefox.firefox /usr/lib/snapd/snap-exec firefox https://github.com/kid13yt/pc-virus-memz.exe/raw/refs/heads/main/MEMZ.exe/snap/snapd/20290/usr/lib/snapd/snap-confinefirefox
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
40688dumpe2fs -h /dev/sda3/usr/sbin/dumpe2fsudisksd
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
40689snap-update-ns --from-snap-confine firefox/snap/snapd/20290/usr/lib/snapd/snap-update-nsfirefox
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
40696systemctl --user --global is-enabled snap.snapd-desktop-integration.snapd-desktop-integration.service/usr/bin/systemctlsnapd
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
40697dumpe2fs -h /dev/sda3/usr/sbin/dumpe2fsudisksd
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
Executable files
0
Suspicious files
0
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
41188file-roller/home/user/.local/share/recently-used.xbelxml
MD5:
SHA256:
41188file-roller/home/user/.local/share/recently-used.xbel.CI4252xml
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
25
TCP/UDP connections
55
DNS requests
95
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
204
91.189.91.96:80
http://connectivity-check.ubuntu.com/
unknown
whitelisted
GET
204
91.189.91.96:80
http://connectivity-check.ubuntu.com/
unknown
whitelisted
40668
firefox
GET
200
34.107.221.82:80
http://detectportal.firefox.com/canonical.html
unknown
whitelisted
40668
firefox
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
unknown
whitelisted
40668
firefox
POST
200
172.64.149.23:80
http://ocsp.sectigo.com/
unknown
whitelisted
40668
firefox
POST
200
172.64.149.23:80
http://ocsp.sectigo.com/
unknown
whitelisted
40668
firefox
POST
200
184.24.77.57:80
http://r11.o.lencr.org/
unknown
whitelisted
40668
firefox
POST
200
142.250.185.99:80
http://o.pki.goog/s/wr3/FIY
unknown
whitelisted
40668
firefox
POST
200
184.24.77.57:80
http://r11.o.lencr.org/
unknown
whitelisted
40668
firefox
POST
200
142.250.185.99:80
http://o.pki.goog/we2
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
484
avahi-daemon
224.0.0.251:5353
unknown
91.189.91.96:80
Canonical Group Limited
US
unknown
169.150.255.184:443
odrs.gnome.org
GB
whitelisted
512
snapd
185.125.188.58:443
api.snapcraft.io
Canonical Group Limited
GB
whitelisted
40668
firefox
34.36.137.203:443
contile.services.mozilla.com
whitelisted
40668
firefox
140.82.121.4:443
github.com
GITHUB
US
whitelisted
40668
firefox
34.107.221.82:80
detectportal.firefox.com
GOOGLE
US
whitelisted
40668
firefox
172.64.149.23:80
ocsp.sectigo.com
CLOUDFLARENET
US
whitelisted
40668
firefox
184.24.77.57:80
r11.o.lencr.org
Akamai International B.V.
DE
whitelisted
40668
firefox
142.250.185.99:80
o.pki.goog
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.181.238
  • 2a00:1450:4001:827::200e
whitelisted
odrs.gnome.org
  • 169.150.255.184
  • 212.102.56.179
  • 169.150.255.181
  • 37.19.194.81
  • 207.211.211.26
  • 195.181.175.41
  • 195.181.170.18
  • 2a02:6ea0:c700::11
  • 2a02:6ea0:c700::107
  • 2a02:6ea0:c700::101
  • 2a02:6ea0:c700::21
  • 2a02:6ea0:c700::18
  • 2a02:6ea0:c700::112
  • 2a02:6ea0:c700::19
whitelisted
api.snapcraft.io
  • 185.125.188.58
  • 185.125.188.57
  • 185.125.188.54
  • 185.125.188.59
  • 2620:2d:4000:1010::344
  • 2620:2d:4000:1010::2e6
  • 2620:2d:4000:1010::117
  • 2620:2d:4000:1010::42
whitelisted
github.com
  • 140.82.121.4
whitelisted
detectportal.firefox.com
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted
ocsp.sectigo.com
  • 172.64.149.23
  • 104.18.38.233
  • 2606:4700:4400::6812:26e9
  • 2606:4700:4400::ac40:9517
whitelisted
example.org
  • 96.7.128.186
  • 23.215.0.132
  • 23.215.0.133
  • 96.7.128.192
  • 2600:1408:ec00:36::1736:7f2f
  • 2600:1406:bc00:17::6007:810d
  • 2600:1408:ec00:36::1736:7f2e
  • 2600:1406:bc00:17::6007:8128
whitelisted
ipv4only.arpa
  • 192.0.0.170
  • 192.0.0.171
whitelisted
contile.services.mozilla.com
  • 34.36.137.203
whitelisted
spocs.getpocket.com
  • 34.36.137.203
whitelisted

Threats

PID
Process
Class
Message
445
systemd-resolved
Not Suspicious Traffic
INFO [ANY.RUN] Attempting to access raw user content on GitHub
445
systemd-resolved
Not Suspicious Traffic
INFO [ANY.RUN] Attempting to access raw user content on GitHub
No debug info