URL:

https://libgen.li/edition.php?id=138745301

Full analysis: https://app.any.run/tasks/58a830a7-2ce2-4f27-956b-0889f6df5c0b
Verdict: Malicious activity
Analysis date: January 30, 2024, 19:09:24
OS: Ubuntu 22.04.2
MD5:

D0C5AA32100E0E8BB53954126F5CC809

SHA1:

26534430B0331CA96E8DE2455130E85E5180762A

SHA256:

5928F6B08E4A5258400D24E0B12AFB31F1F90F4430253C7A2EE7FEFF502250BB

SSDEEP:

3:N8MHXuawMbWdSTU:2M3Jw2Wd+U

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
441
Monitored processes
83
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start sh no specs sudo no specs firefox no specs locale-check no specs snap-seccomp no specs snap-confine no specs snap-confine no specs 5 no specs date no specs chmod no specs bash no specs md5sum no specs cat no specs bash no specs cat no specs md5sum no specs grep no specs snapctl no specs snapctl no specs realpath no specs realpath no specs xdg-user-dirs-update no specs bash no specs realpath no specs bash no specs realpath no specs bash no specs realpath no specs bash no specs realpath no specs bash no specs realpath no specs bash no specs realpath no specs bash no specs realpath no specs bash no specs realpath no specs ln no specs rm no specs ln no specs firefox no specs glxtest no specs firefox no specs firefox no specs firefox no specs firefox no specs xdg-settings no specs dbus-send no specs cut no specs xdg-settings no specs awk no specs awk no specs firefox no specs firefox no specs xdg-settings no specs dbus-send no specs cut no specs xdg-settings no specs awk no specs awk no specs firefox no specs firefox no specs firefox no specs firefox no specs firefox no specs xdg-settings no specs dbus-send no specs cut no specs xdg-settings no specs awk no specs awk no specs which no specs firefox no specs firefox no specs firefox no specs firefox no specs firefox no specs firefox no specs firefox no specs firefox no specs firefox no specs firefox no specs

Process information

PID
CMD
Path
Indicators
Parent process
6850/bin/sh -c "DISPLAY=:0 sudo -iu user firefox \"https://libgen\.li/edition\.php?id=138745301\" " /bin/shany-guest-agent
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
6851sudo -iu user firefox https://libgen.li/edition.php?id=138745301 /usr/bin/sudosh
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
6852/snap/firefox/3358/usr/lib/firefox/firefox https://libgen.li/edition.php?id=138745301 /snap/firefox/3358/usr/lib/firefox/firefoxsudo
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
6853/usr/bin/locale-check C.UTF-8 /usr/bin/locale-checkfirefox
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
6864/snap/snapd/20290/usr/lib/snapd/snap-seccomp version-info /snap/snapd/20290/usr/lib/snapd/snap-seccompfirefox
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
6872/snap/snapd/20290/usr/lib/snapd/snap-confine --base core22 snap.firefox.firefox /usr/lib/snapd/snap-exec firefox https://libgen.li/edition.php?id=138745301 /snap/snapd/20290/usr/lib/snapd/snap-confinefirefox
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
6873/snap/snapd/20290/usr/lib/snapd/snap-confine --base core22 snap.firefox.firefox /usr/lib/snapd/snap-exec firefox https://libgen.li/edition.php?id=138745301 /snap/snapd/20290/usr/lib/snapd/snap-confinefirefox
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
6874snap-update-ns --from-snap-confine --user-mounts firefox /dev/fd/5firefox
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
6885date +%s.%N /usr/bin/datefirefox
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
6886chmod 700 /home/user/snap/firefox/3358/.config /usr/bin/chmodfirefox
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
6852firefox/tmp/snap-private-tmp/snap.firefox/tmp/firefox/.parentlock
MD5:
SHA256:
6852firefox/home/user/snap/firefox/common/.cache/mozilla/firefox/roxl94gw.default/.startup-incomplete
MD5:
SHA256:
6852firefox/home/user/snap/firefox/common/.mozilla/firefox/roxl94gw.default/sessionCheckpoints.json.tmp
MD5:
SHA256:
6852firefox/home/user/snap/firefox/common/.mozilla/firefox/roxl94gw.default/cert9.db-journal
MD5:
SHA256:
6852firefox/home/user/snap/firefox/common/.mozilla/firefox/roxl94gw.default/storage.sqlite-journal
MD5:
SHA256:
6852firefox/home/user/snap/firefox/common/.mozilla/firefox/roxl94gw.default/protections.sqlite-journal
MD5:
SHA256:
6852firefox/home/user/snap/firefox/common/.mozilla/firefox/roxl94gw.default/content-prefs.sqlite-journal
MD5:
SHA256:
6852firefox/home/user/snap/firefox/common/.mozilla/firefox/roxl94gw.default/prefs-1.js
MD5:
SHA256:
6852firefox/home/user/snap/firefox/common/.cache/mozilla/firefox/roxl94gw.default/cache2/entries/09B20518D9345274CC2E2934FF4ED0FF2BD0D5E6
MD5:
SHA256:
6852firefox/home/user/snap/firefox/common/.cache/mozilla/firefox/roxl94gw.default/cache2/entries/8152854A5EBF9CD17E5F06DDF4DB29D66A7AC9AE
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
20
TCP/UDP connections
48
DNS requests
99
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
204
34.122.121.32:80
http://connectivity-check.ubuntu.com/
unknown
unknown
GET
204
35.232.111.17:80
http://connectivity-check.ubuntu.com/
unknown
unknown
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
unknown
text
8 b
unknown
POST
200
95.101.54.195:80
http://r3.o.lencr.org/
unknown
binary
503 b
unknown
GET
200
34.107.221.82:80
http://detectportal.firefox.com/canonical.html
unknown
text
90 b
unknown
POST
200
18.238.246.206:80
http://ocsp.r2m02.amazontrust.com/
unknown
binary
471 b
unknown
POST
200
95.101.54.195:80
http://r3.o.lencr.org/
unknown
binary
503 b
unknown
POST
200
142.250.186.67:80
http://ocsp.pki.goog/gts1c3
unknown
binary
472 b
unknown
POST
200
95.101.54.195:80
http://r3.o.lencr.org/
unknown
binary
503 b
unknown
POST
200
95.101.54.195:80
http://r3.o.lencr.org/
unknown
binary
503 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
224.0.0.251:5353
unknown
34.122.121.32:80
GOOGLE-CLOUD-PLATFORM
US
unknown
91.189.91.49:80
Canonical Group Limited
US
unknown
185.125.190.17:80
Canonical Group Limited
GB
unknown
212.102.56.179:443
Datacamp Limited
DE
unknown
35.232.111.17:80
GOOGLE-CLOUD-PLATFORM
US
unknown
104.21.57.230:443
libgen.li
CLOUDFLARENET
unknown
34.107.221.82:80
detectportal.firefox.com
GOOGLE
US
unknown
34.117.237.239:443
contile.services.mozilla.com
GOOGLE-CLOUD-PLATFORM
US
unknown
3.208.221.93:443
spocs.getpocket.com
AMAZON-AES
US
unknown

DNS requests

Domain
IP
Reputation
libgen.li
  • 104.21.57.230
  • 172.67.193.122
  • 2606:4700:3031::6815:39e6
  • 2606:4700:3035::ac43:c17a
unknown
detectportal.firefox.com
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted
contile.services.mozilla.com
  • 34.117.237.239
whitelisted
spocs.getpocket.com
  • 3.208.221.93
  • 34.205.194.46
  • 52.22.97.188
  • 3.228.133.50
shared
proxyserverecs-1736642167.us-east-1.elb.amazonaws.com
unknown
example.org
  • 93.184.216.34
  • 2606:2800:220:1:248:1893:25c8:1946
whitelisted
ipv4only.arpa
  • 192.0.0.170
  • 192.0.0.171
whitelisted
r3.o.lencr.org
  • 95.101.54.195
  • 95.101.54.114
  • 95.101.54.106
  • 95.101.54.203
  • 2a02:26f0:780::5f65:3683
  • 2a02:26f0:780::5f65:366b
  • 2a02:26f0:780::210:ca79
  • 2a02:26f0:780::5f65:36d3
  • 2a02:26f0:780::5f65:3672
  • 104.124.11.185
  • 104.124.11.208
  • 104.124.11.136
  • 2a02:26f0:480:e::210:f108
  • 2a02:26f0:480:e::210:f10f
  • 95.101.54.123
  • 2a02:26f0:780::5f65:36cb
  • 2a02:26f0:780::5f65:36c2
  • 2a02:26f0:780::5f65:36d0
  • 2a02:26f0:780::5f65:3669
  • 104.124.11.209
  • 2a02:26f0:780::5f65:36c3
  • 2a02:26f0:780::5f65:367b
shared
content-signature-2.cdn.mozilla.net
  • 34.160.144.191
  • 2600:1901:0:92a9::
whitelisted
ocsp.r2m02.amazontrust.com
  • 18.238.246.206
whitelisted

Threats

PID
Process
Class
Message
Not Suspicious Traffic
INFO [ANY.RUN] jQuery JavaScript Library Code Loaded (code.jquery .com)
Not Suspicious Traffic
INFO [ANY.RUN] A free CDN for open source projects (jsdelivr .net)
Not Suspicious Traffic
INFO [ANY.RUN] A free CDN for open source projects (jsdelivr .net)
Not Suspicious Traffic
INFO [ANY.RUN] A free CDN for open source projects (jsdelivr .net)
No debug info