URL:

pmbounces.roamsys.com

Full analysis: https://app.any.run/tasks/e9a6b203-667a-4806-b423-367ff2a6a9fb
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: April 08, 2025, 17:35:03
OS: Ubuntu 22.04.2
Tags:
loader
MD5:

2A33406A5DA834BB21DDEF67D15573AD

SHA1:

EC7186FFCD4BDEE93B05A4A83E0B8346EA6B0CE5

SHA256:

5E4764EDD46551216D73B4B912B3D4EC3D5FB44198E444DB7612AA98DBB46831

SSDEEP:

3:dzjKhXn:dzjKhXn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executes commands using command-line interpreter

      • sudo (PID: 40665)
      • chrome (PID: 40666)
    • Process requests binary or script from the Internet

      • chrome (PID: 40712)
  • INFO

    • Checks timezone

      • chrome (PID: 40666)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
308
Monitored processes
88
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start dash no specs sudo no specs chrome no specs locale-check no specs readlink no specs dirname no specs mkdir no specs cat no specs cat no specs chrome no specs chrome_crashpad_handler no specs chrome_crashpad_handler no specs chrome no specs chrome_crashpad_handler no specs chrome no specs chrome no specs chrome no specs chrome no specs chrome no specs chrome chrome no specs chrome no specs chrome no specs dash no specs dbus-send no specs dash no specs dash no specs basename no specs dash no specs grep no specs cut no specs dash no specs dash no specs readlink no specs dash no specs dash no specs dash no specs dbus-send no specs dash no specs dash no specs dash no specs dash no specs mawk no specs cut no specs basename no specs dash no specs dash no specs readlink no specs dbus-send no specs dash no specs dash no specs dash no specs grep no specs cut no specs dash no specs mawk no specs cut no specs basename no specs dash no specs grep no specs cut no specs dash no specs dash no specs readlink no specs chrome no specs systemctl no specs systemctl no specs chrome no specs systemctl no specs systemctl no specs chrome no specs readlink no specs dirname no specs mkdir no specs cat no specs cat no specs chrome no specs chrome no specs chrome no specs chrome no specs chrome no specs chrome no specs chrome no specs chrome no specs chrome no specs chrome no specs chrome no specs chrome no specs

Process information

PID
CMD
Path
Indicators
Parent process
40664/bin/sh -c "DISPLAY=:0 sudo -iu user google-chrome pmbounces\.roamsys\.com "/usr/bin/dashany-guest-agent
User:
root
Integrity Level:
UNKNOWN
40665sudo -iu user google-chrome pmbounces.roamsys.com/usr/bin/sudodash
User:
root
Integrity Level:
UNKNOWN
40666/usr/bin/google-chrome pmbounces.roamsys.com/opt/google/chrome/chromesudo
User:
user
Integrity Level:
UNKNOWN
40667/usr/bin/locale-check C.UTF-8/usr/bin/locale-checkchrome
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
40668readlink -f /usr/bin/google-chrome/usr/bin/readlinkchrome
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
40669dirname /opt/google/chrome/google-chrome/usr/bin/dirnamechrome
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
40670mkdir -p /home/user/.local/share/applications/usr/bin/mkdirchrome
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
40671cat/usr/bin/catchrome
User:
user
Integrity Level:
UNKNOWN
40672cat/usr/bin/catchrome
User:
user
Integrity Level:
UNKNOWN
40673"/opt/google/chrome/chrome pmbounces\.roamsys\.c"/opt/google/chrome/chromechrome
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
Executable files
2
Suspicious files
286
Text files
9
Unknown types
0

Dropped files

PID
Process
Filename
Type
40666chrome/home/user/.config/google-chrome/ShaderCache/data_3binary
MD5:
SHA256:
40666chrome/home/user/.config/google-chrome/ShaderCache/data_2binary
MD5:
SHA256:
40666chrome/home/user/.config/google-chrome/ShaderCache/data_0binary
MD5:
SHA256:
40666chrome/home/user/.config/google-chrome/Default/GPUCache/data_3binary
MD5:
SHA256:
40666chrome/home/user/.config/google-chrome/Default/GPUCache/data_2binary
MD5:
SHA256:
40666chrome/home/user/.config/google-chrome/Default/GPUCache/data_0binary
MD5:
SHA256:
40709chrome/home/user/.cache/mesa_shader_cache/indexbinary
MD5:
SHA256:
40811chrome/home/user/.cache/mesa_shader_cache/indexbinary
MD5:
SHA256:
40666chrome/home/user/.config/google-chrome/Default/Historybinary
MD5:
SHA256:
40666chrome/home/user/.config/google-chrome/Default/DawnWebGPUCache/data_3binary
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
10
TCP/UDP connections
39
DNS requests
54
Threats
19

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
204
185.125.190.97:80
http://connectivity-check.ubuntu.com/
unknown
whitelisted
40712
chrome
GET
200
3.132.254.202:80
http://pmbounces.roamsys.com/
unknown
unknown
40712
chrome
GET
200
3.132.254.202:80
http://pmbounces.roamsys.com/modernizr.js
unknown
unknown
40712
chrome
GET
200
142.250.184.206:80
http://www.google-analytics.com/r/__utm.gif?utmwv=5.7.2&utms=1&utmn=1679236208&utmhn=pmbounces.roamsys.com&utmcs=UTF-8&utmsr=1280x720&utmvp=991x562&utmsc=24-bit&utmul=en-gb&utmje=0&utmfl=-&utmdt=Postmark%20%E2%80%94%20Email%20delivery%20for%20web%20apps&utmhid=598027177&utmr=-&utmp=%2F&utmht=1744133711297&utmac=UA-507677-17&utmcc=__utma%3D199676335.701859818.1744133711.1744133711.1744133711.1%3B%2B__utmz%3D199676335.1744133711.1.1.utmcsr%3D(direct)%7Cutmccn%3D(direct)%7Cutmcmd%3D(none)%3B&utmjid=2133171687&utmredir=1&utmu=qAAAAAAAAAAAAAAAAAAAAAAE~
unknown
whitelisted
40712
chrome
GET
200
142.250.184.206:80
http://www.google-analytics.com/ga.js
unknown
whitelisted
40712
chrome
GET
200
3.132.254.202:80
http://pmbounces.roamsys.com/logo@2x.png
unknown
unknown
40712
chrome
GET
200
3.132.254.202:80
http://pmbounces.roamsys.com/landing.css
unknown
unknown
40712
chrome
GET
200
3.132.254.202:80
http://pmbounces.roamsys.com/favicon.ico
unknown
unknown
40712
chrome
GET
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/k7gxgnnbcbx27yzcp3wdpr3nw4_2025.4.7.1/jflhchccmppkfebkiaminageehmchikm_2025.04.07.01_all_pzqexqgg2q2vehus2ide76rcve.crx3
unknown
whitelisted
40712
chrome
GET
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/ngifsy4k4mu7bcrdyhc4vjaocy_2025.4.2.0/gonpemdgkjcecdgbnaabipppbmgfggbe_2025.04.02.00_all_adnkhxd45xqajkfutwmwv6agl33q.crx3
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
185.125.190.97:80
connectivity-check.ubuntu.com
Canonical Group Limited
GB
whitelisted
484
avahi-daemon
224.0.0.251:5353
unknown
212.102.56.178:443
odrs.gnome.org
Datacamp Limited
DE
whitelisted
512
snapd
185.125.188.54:443
api.snapcraft.io
Canonical Group Limited
GB
whitelisted
40712
chrome
142.250.186.131:443
clientservices.googleapis.com
GOOGLE
US
whitelisted
40712
chrome
142.250.185.170:443
safebrowsingohttpgateway.googleapis.com
GOOGLE
US
whitelisted
40712
chrome
142.250.153.84:443
accounts.google.com
GOOGLE
US
whitelisted
40712
chrome
3.132.254.202:80
pmbounces.roamsys.com
AMAZON-02
US
suspicious
40712
chrome
3.129.235.117:443
pmbounces.roamsys.com
AMAZON-02
US
suspicious
40712
chrome
151.101.1.91:443
google-ohttp-relay-safebrowsing.fastly-edge.com
FASTLY
US
unknown

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.174
  • 2a00:1450:4001:82b::200e
whitelisted
connectivity-check.ubuntu.com
  • 185.125.190.97
  • 185.125.190.48
  • 185.125.190.17
  • 91.189.91.96
  • 185.125.190.49
  • 91.189.91.97
  • 185.125.190.96
  • 91.189.91.49
  • 91.189.91.48
  • 91.189.91.98
  • 185.125.190.98
  • 185.125.190.18
  • 2620:2d:4002:1::196
  • 2620:2d:4000:1::97
  • 2620:2d:4000:1::98
  • 2620:2d:4000:1::2a
  • 2001:67c:1562::24
  • 2620:2d:4002:1::197
  • 2620:2d:4000:1::2b
  • 2620:2d:4002:1::198
  • 2620:2d:4000:1::22
  • 2620:2d:4000:1::96
  • 2620:2d:4000:1::23
  • 2001:67c:1562::23
whitelisted
odrs.gnome.org
  • 212.102.56.178
  • 195.181.170.18
  • 207.211.211.27
  • 195.181.175.40
  • 169.150.255.181
  • 169.150.255.183
  • 37.19.194.80
  • 2a02:6ea0:c700::21
  • 2a02:6ea0:c700::107
  • 2a02:6ea0:c700::11
  • 2a02:6ea0:c700::19
  • 2a02:6ea0:c700::101
  • 2a02:6ea0:c700::18
  • 2a02:6ea0:c700::112
whitelisted
api.snapcraft.io
  • 185.125.188.54
  • 185.125.188.59
  • 185.125.188.55
  • 185.125.188.58
  • 2620:2d:4000:1010::6d
  • 2620:2d:4000:1010::117
  • 2620:2d:4000:1010::344
  • 2620:2d:4000:1010::42
whitelisted
clientservices.googleapis.com
  • 142.250.186.131
whitelisted
safebrowsingohttpgateway.googleapis.com
  • 142.250.185.170
  • 216.58.206.42
  • 142.250.186.138
  • 142.250.185.138
  • 216.58.212.138
  • 142.250.185.234
  • 142.250.186.42
  • 172.217.18.106
  • 142.250.184.234
  • 142.250.181.234
  • 142.250.184.202
  • 142.250.185.202
  • 142.250.185.106
  • 142.250.186.170
  • 142.250.74.202
  • 142.250.185.74
whitelisted
pmbounces.roamsys.com
  • 3.132.254.202
  • 3.129.235.117
  • 13.59.73.32
unknown
pm.mtasv.net
unknown
accounts.google.com
  • 142.250.153.84
whitelisted
google-ohttp-relay-safebrowsing.fastly-edge.com
  • 151.101.1.91
  • 151.101.65.91
  • 151.101.129.91
  • 151.101.193.91
unknown

Threats

PID
Process
Class
Message
40712
chrome
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
40712
chrome
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
40712
chrome
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
40712
chrome
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
40712
chrome
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
40712
chrome
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
40712
chrome
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
40712
chrome
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
40712
chrome
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
40712
chrome
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
No debug info