URL:

https://libgen.li/edition.php?id=138745301

Full analysis: https://app.any.run/tasks/bc200d37-bf00-46b2-a983-f508d9b1dff5
Verdict: Malicious activity
Analysis date: January 30, 2024, 19:10:46
OS: Ubuntu 22.04.2
MD5:

D0C5AA32100E0E8BB53954126F5CC809

SHA1:

26534430B0331CA96E8DE2455130E85E5180762A

SHA256:

5928F6B08E4A5258400D24E0B12AFB31F1F90F4430253C7A2EE7FEFF502250BB

SSDEEP:

3:N8MHXuawMbWdSTU:2M3Jw2Wd+U

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
440
Monitored processes
82
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start sh no specs sudo no specs firefox no specs locale-check no specs snap-seccomp no specs snap-confine no specs snap-confine no specs 5 no specs date no specs chmod no specs bash no specs md5sum no specs cat no specs bash no specs md5sum no specs cat no specs grep no specs snapctl no specs snapctl no specs realpath no specs realpath no specs xdg-user-dirs-update no specs bash no specs bash no specs realpath no specs realpath no specs bash no specs realpath no specs bash no specs realpath no specs bash no specs realpath no specs bash no specs realpath no specs bash no specs realpath no specs bash no specs realpath no specs ln no specs rm no specs ln no specs firefox no specs snap no specs firefox no specs firefox no specs firefox no specs firefox no specs xdg-settings no specs dbus-send no specs cut no specs xdg-settings no specs awk no specs awk no specs firefox no specs firefox no specs xdg-settings no specs dbus-send no specs cut no specs xdg-settings no specs awk no specs awk no specs firefox no specs firefox no specs firefox no specs firefox no specs firefox no specs firefox no specs firefox no specs firefox no specs firefox no specs xdg-settings no specs dbus-send no specs cut no specs xdg-settings no specs awk no specs dash no specs awk no specs cut no specs firefox no specs firefox no specs firefox no specs firefox no specs

Process information

PID
CMD
Path
Indicators
Parent process
6849/bin/sh -c "DISPLAY=:0 sudo -iu user firefox \"https://libgen\.li/edition\.php?id=138745301\" " /bin/shany-guest-agent
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
6850sudo -iu user firefox https://libgen.li/edition.php?id=138745301 /usr/bin/sudosh
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
6851/snap/firefox/3358/usr/lib/firefox/firefox https://libgen.li/edition.php?id=138745301 /snap/firefox/3358/usr/lib/firefox/firefoxsudo
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
6852/usr/bin/locale-check C.UTF-8 /usr/bin/locale-checkfirefox
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
6863/snap/snapd/20290/usr/lib/snapd/snap-seccomp version-info /snap/snapd/20290/usr/lib/snapd/snap-seccompfirefox
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
6871/snap/snapd/20290/usr/lib/snapd/snap-confine --base core22 snap.firefox.firefox /usr/lib/snapd/snap-exec firefox https://libgen.li/edition.php?id=138745301 /snap/snapd/20290/usr/lib/snapd/snap-confinefirefox
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
6872/snap/snapd/20290/usr/lib/snapd/snap-confine --base core22 snap.firefox.firefox /usr/lib/snapd/snap-exec firefox https://libgen.li/edition.php?id=138745301 /snap/snapd/20290/usr/lib/snapd/snap-confinefirefox
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
6873snap-update-ns --from-snap-confine --user-mounts firefox /dev/fd/5firefox
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
6884date +%s.%N /usr/bin/datefirefox
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
6885chmod 700 /home/user/snap/firefox/3358/.config /usr/bin/chmodfirefox
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
6851firefox/home/user/snap/firefox/common/.mozilla/firefox/roxl94gw.default/sessionCheckpoints.json.tmp
MD5:
SHA256:
6851firefox/home/user/snap/firefox/common/.mozilla/firefox/roxl94gw.default/cert9.db-journal
MD5:
SHA256:
6851firefox/home/user/snap/firefox/common/.mozilla/firefox/roxl94gw.default/prefs-1.js
MD5:
SHA256:
6851firefox/home/user/snap/firefox/common/.mozilla/firefox/roxl94gw.default/storage.sqlite-journal
MD5:
SHA256:
6851firefox/home/user/snap/firefox/common/.mozilla/firefox/roxl94gw.default/content-prefs.sqlite-journal
MD5:
SHA256:
6851firefox/home/user/snap/firefox/common/.mozilla/firefox/roxl94gw.default/protections.sqlite-journal
MD5:
SHA256:
6851firefox/home/user/snap/firefox/common/.cache/mozilla/firefox/roxl94gw.default/cache2/entries/8C6E163C1B51FA941A8BF680466C88D5AC99FCBA
MD5:
SHA256:
6851firefox/home/user/snap/firefox/common/.cache/mozilla/firefox/roxl94gw.default/cache2/entries/8152854A5EBF9CD17E5F06DDF4DB29D66A7AC9AE
MD5:
SHA256:
6851firefox/home/user/snap/firefox/common/.cache/mozilla/firefox/roxl94gw.default/cache2/entries/5D6B3114EA3CA31394324A345DF6FCF07B5DE46E
MD5:
SHA256:
6851firefox/home/user/snap/firefox/common/.cache/mozilla/firefox/roxl94gw.default/cache2/entries/09B20518D9345274CC2E2934FF4ED0FF2BD0D5E6
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
21
TCP/UDP connections
48
DNS requests
100
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
34.107.221.82:80
http://detectportal.firefox.com/canonical.html
unknown
text
90 b
unknown
POST
200
95.101.54.99:80
http://r3.o.lencr.org/
unknown
binary
503 b
unknown
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
unknown
text
8 b
unknown
POST
200
13.32.1.186:80
http://ocsp.r2m02.amazontrust.com/
unknown
binary
471 b
unknown
POST
200
142.250.186.35:80
http://ocsp.pki.goog/gts1c3
unknown
binary
472 b
unknown
POST
200
95.101.54.99:80
http://r3.o.lencr.org/
unknown
binary
503 b
unknown
POST
200
95.101.54.99:80
http://r3.o.lencr.org/
unknown
binary
503 b
unknown
POST
200
95.101.54.99:80
http://r3.o.lencr.org/
unknown
binary
503 b
unknown
POST
200
95.101.54.99:80
http://r3.o.lencr.org/
unknown
binary
503 b
unknown
POST
200
95.101.54.99:80
http://r3.o.lencr.org/
unknown
binary
503 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
224.0.0.251:5353
unknown
185.125.190.49:80
Canonical Group Limited
GB
unknown
156.146.33.137:443
Datacamp Limited
DE
unknown
104.21.57.230:443
libgen.li
CLOUDFLARENET
unknown
34.107.221.82:80
detectportal.firefox.com
GOOGLE
US
unknown
34.117.237.239:443
contile.services.mozilla.com
GOOGLE-CLOUD-PLATFORM
US
unknown
52.22.97.188:443
spocs.getpocket.com
AMAZON-AES
US
unknown
34.160.144.191:443
content-signature-2.cdn.mozilla.net
GOOGLE
US
unknown
95.101.54.99:80
r3.o.lencr.org
Akamai International B.V.
DE
unknown
142.250.185.202:443
safebrowsing.googleapis.com
GOOGLE
US
unknown

DNS requests

Domain
IP
Reputation
libgen.li
  • 104.21.57.230
  • 172.67.193.122
  • 2606:4700:3031::6815:39e6
  • 2606:4700:3035::ac43:c17a
unknown
detectportal.firefox.com
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted
contile.services.mozilla.com
  • 34.117.237.239
whitelisted
spocs.getpocket.com
  • 52.22.97.188
  • 3.228.133.50
  • 3.208.221.93
  • 34.205.194.46
shared
example.org
  • 93.184.216.34
  • 2606:2800:220:1:248:1893:25c8:1946
whitelisted
ipv4only.arpa
  • 192.0.0.170
  • 192.0.0.171
whitelisted
proxyserverecs-1736642167.us-east-1.elb.amazonaws.com
unknown
content-signature-2.cdn.mozilla.net
  • 34.160.144.191
  • 2600:1901:0:92a9::
whitelisted
r3.o.lencr.org
  • 95.101.54.99
  • 2.16.202.121
  • 95.101.54.203
  • 95.101.54.131
  • 95.101.54.106
  • 95.101.54.107
  • 95.101.54.114
  • 2.16.202.115
  • 2a02:26f0:780::5f65:3672
  • 2a02:26f0:780::210:ca73
  • 2a02:26f0:780::5f65:36cb
  • 2a02:26f0:780::5f65:3683
  • 2a02:26f0:780::210:ca79
  • 23.32.238.11
  • 23.32.238.49
  • 23.32.238.27
  • 2a02:26f0:2100::215:6d20
  • 2a02:26f0:2100::215:6d11
shared
safebrowsing.googleapis.com
  • 142.250.185.202
  • 2a00:1450:4001:801::200a
whitelisted

Threats

PID
Process
Class
Message
Not Suspicious Traffic
INFO [ANY.RUN] jQuery JavaScript Library Code Loaded (code.jquery .com)
Not Suspicious Traffic
INFO [ANY.RUN] A free CDN for open source projects (jsdelivr .net)
Not Suspicious Traffic
INFO [ANY.RUN] A free CDN for open source projects (jsdelivr .net)
No debug info