| File name: | dicknet.elf |
| Full analysis: | https://app.any.run/tasks/a3ea75fe-1c5e-4a20-8525-9394eabdb1b7 |
| Verdict: | Malicious activity |
| Threats: | A botnet is a group of internet-connected devices that are controlled by a single individual or group, often without the knowledge or consent of the device owners. These devices can be used to launch a variety of malicious attacks, such as distributed denial-of-service (DDoS) attacks, spam campaigns, and data theft. Botnet malware is the software that is used to infect devices and turn them into part of a botnet. |
| Analysis date: | February 20, 2026, 00:26:21 |
| OS: | Ubuntu 22.04.2 |
| Tags: | |
| Indicators: | |
| MIME: | application/x-executable |
| File info: | ELF 32-bit LSB executable, ARM, EABI4 version 1 (SYSV), statically linked, with debug_info, not stripped |
| MD5: | 4C5A7BE674BE8EC71AC929AA44A5D6F2 |
| SHA1: | 33E2E78FC7FE08539AF5BB22220D1B31E358B76E |
| SHA256: | 6A949A70A145F68826B61DF4DFDF88276FE6776C1C4F6A9434B8F830D4D7B1AA |
| SSDEEP: | 3072:l1FCpY3AWpFBz9EJomUHktGkNy5hgHn4YaHDmW3HwAZSjKOUmtf:P4TamlNy5hgHnxQDmW3HwAZSjKOUmtf |
| .o | | | ELF Executable and Linkable format (generic) (100) |
|---|
| CPUArchitecture: | 32 bit |
|---|---|
| CPUByteOrder: | Little endian |
| ObjectFileType: | Executable file |
| CPUType: | Arm (up to Armv7/AArch32) |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1969 | /bin/sh -c "DISPLAY=:0 sudo -iu user nautilus /home/user/Desktop/dicknet\.elf " | /usr/bin/dash | — | 2EwNpII9hL0vkNEQ | |||||||||||
User: user Integrity Level: UNKNOWN Exit code: 0 Modules
| |||||||||||||||
| 1970 | sudo -iu user nautilus /home/user/Desktop/dicknet.elf | /usr/bin/sudo | — | dash | |||||||||||
User: root Integrity Level: UNKNOWN Exit code: 0 Modules
| |||||||||||||||
| 1971 | nautilus /home/user/Desktop/dicknet.elf | /usr/bin/nautilus | — | sudo | |||||||||||
User: user Integrity Level: UNKNOWN Exit code: 0 Modules
| |||||||||||||||
| 1972 | /usr/bin/locale-check C.UTF-8 | /usr/bin/locale-check | — | nautilus | |||||||||||
User: user Integrity Level: UNKNOWN Exit code: 0 Modules
| |||||||||||||||
| 1985 | /lib/systemd/systemd-hostnamed | /usr/lib/systemd/systemd-hostnamed | — | systemd | |||||||||||
User: root Integrity Level: UNKNOWN Exit code: 0 Modules
| |||||||||||||||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 204 | 91.189.91.96:80 | http://connectivity-check.ubuntu.com/ | unknown | — | — | unknown |
— | — | GET | 204 | 185.125.190.49:80 | http://connectivity-check.ubuntu.com/ | unknown | — | — | unknown |
— | — | GET | 204 | 185.125.190.49:80 | http://connectivity-check.ubuntu.com/ | unknown | — | — | unknown |
— | — | POST | 200 | 185.125.188.54:443 | https://api.snapcraft.io/v2/snaps/refresh | unknown | binary | 39.3 Kb | unknown |
— | — | POST | 200 | 185.125.188.54:443 | https://api.snapcraft.io/api/v1/snaps/auth/nonces | unknown | binary | 53 b | unknown |
— | — | POST | 200 | 185.125.188.59:443 | https://api.snapcraft.io/api/v1/snaps/auth/sessions | unknown | text | 587 b | unknown |
— | — | POST | 200 | 185.125.188.57:443 | https://api.snapcraft.io/v2/snaps/refresh | unknown | text | 39.3 Kb | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
456 | avahi-daemon | 224.0.0.251:5353 | — | — | — | whitelisted |
— | — | 185.125.190.49:80 | — | CANONICAL-AS | GB | whitelisted |
— | — | 91.189.91.96:80 | — | CANONICAL-AS | GB | whitelisted |
473 | snapd | 185.125.188.58:443 | api.snapcraft.io | CANONICAL-AS | GB | whitelisted |
416 | systemd-timesyncd | 91.189.91.157:123 | ntp.ubuntu.com | CANONICAL-AS | GB | whitelisted |
416 | systemd-timesyncd | 185.125.190.57:123 | ntp.ubuntu.com | CANONICAL-AS | GB | whitelisted |
416 | systemd-timesyncd | 185.125.190.56:123 | ntp.ubuntu.com | CANONICAL-AS | GB | whitelisted |
416 | systemd-timesyncd | 185.125.190.58:123 | ntp.ubuntu.com | CANONICAL-AS | GB | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
9.100.168.192.in-addr.arpa |
| whitelisted |
api.snapcraft.io |
| whitelisted |
ntp.ubuntu.com |
| whitelisted |
connectivity-check.ubuntu.com |
| whitelisted |